[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 69.337463][ T26] audit: type=1800 audit(1584069779.018:25): pid=9452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 69.370202][ T26] audit: type=1800 audit(1584069779.018:26): pid=9452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 69.398068][ T26] audit: type=1800 audit(1584069779.018:27): pid=9452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.1' (ECDSA) to the list of known hosts. 2020/03/13 03:23:08 fuzzer started 2020/03/13 03:23:09 dialing manager at 10.128.0.26:43483 2020/03/13 03:23:10 syscalls: 2996 2020/03/13 03:23:10 code coverage: enabled 2020/03/13 03:23:10 comparison tracing: enabled 2020/03/13 03:23:10 extra coverage: enabled 2020/03/13 03:23:10 setuid sandbox: enabled 2020/03/13 03:23:10 namespace sandbox: enabled 2020/03/13 03:23:10 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/13 03:23:10 fault injection: enabled 2020/03/13 03:23:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/13 03:23:10 net packet injection: enabled 2020/03/13 03:23:10 net device setup: enabled 2020/03/13 03:23:10 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/13 03:23:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 03:26:14 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) write$capi20_data(r0, &(0x7f0000000040)={{0x10, 0x8, 0x80, 0x83, 0x400, 0x6}, 0x61, "501bba6c3a6b55877b1303a4b3080de8520d18cc2752a50c3aa6c39294622be5d0bbe9a1d7ee8f5916a0061503f3d1e20293e79570ea27ed553a2019b201ca75c5cf2fbcc4a6df3094478aee3176372174f31cf77e5b6275e8b0ab378cbe85fe9a"}, 0x73) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x4000000, 0x1ff, {r1, r2/1000+10000}, {0x1, 0xc, 0x4, 0x86, 0x3, 0x58, "2ef0d3e5"}, 0x2, 0x4, @planes=&(0x7f0000000100)={0x3, 0xfffffffd, @fd=0xffffffffffffffff, 0x1}, 0x8, 0x0, 0xffffffffffffffff}) write$P9_RUNLINKAT(r4, &(0x7f00000001c0)={0x7, 0x4d, 0x2}, 0x7) r5 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x460500) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x8, 0x2, 0x4, 0x0, 0xab, {}, {0x3, 0x2, 0x9, 0x9, 0x80, 0x1f, "ec01afee"}, 0x0, 0x3, @planes=&(0x7f00000002c0)={0x3, 0x10000, @mem_offset=0x9, 0x7f}, 0x8, 0x0, r3}) r7 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') r8 = accept$packet(r4, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f0000000780)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0xa0, r7, 0x4, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r11}}}]}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000880}, 0x4000) r12 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r12, 0x894b, &(0x7f0000000800)) ioctl$int_out(r4, 0x5460, &(0x7f0000000840)) r13 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$CAPI_GET_MANUFACTURER(r13, 0xc0044306, &(0x7f0000000880)=0x1) r14 = socket$l2tp6(0xa, 0x2, 0x73) r15 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000008c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000940)=0x0) r17 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)=0x0) statx(0xffffffffffffff9c, &(0x7f0000003f40)='./file0\x00', 0x400, 0x2, &(0x7f0000003f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = openat(0xffffffffffffffff, &(0x7f0000004080)='./file0\x00', 0x200000, 0x45) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004100)={0x0, r12, 0x0, 0x1, &(0x7f00000040c0)='\x00', 0xffffffffffffffff}, 0x30) fstat(r8, &(0x7f0000004140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000041c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r0, &(0x7f0000004240)='./file0\x00', 0x4000, 0x400, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r15, &(0x7f0000004400)={&(0x7f0000000900)=@proc={0x10, 0x0, 0x25dfdbfd, 0x200000}, 0xc, &(0x7f0000003ec0)=[{&(0x7f0000000980)={0x335c, 0x19, 0x400, 0x70bd29, 0x25dfdbfc, "", [@generic="a7762659b8ce5ee19ea52968ab9e827e32fa8c8fc7cbdeaf55dba68d673537d711f77b0f5c664f11d49f3c75a1b0837bfee59a19648e1d7cbc8096194935c712e5b6b0fbdfb5c00ad24ac9b9d649578408444ab9440df2e9d85a968789acd278249b6128df804ea7288e772d799a422bb967945fe1e7ad75d4170757c382387d33ae6bfd760820a1fa50d8ed4859bdd4d9a26d15d7b5868312c8d4f7ad8e5683d567c6766913d16a196f6c4d09012d3879a17d3b84a756b76a4d907e", @generic="ff06968696513efcae100d9378717f7111be63d46a815cfd579dff51cf31c8e3839871ea6ea9cb8d8d8eb8b544de1dfa839d604170c75c4d963872117766f363673d209ca827d77608593cdf8839b99624e3da712dba52c90cf01be38ae9698a66c21342c2d52b78e1a049965b717b3d4c07c0d7da7d6ad72ba1cc65d57c8fb56a0961bf719513f3142f0592dd191f1330f004805817c140fd0a09b1ee52629ea5526035e9d3aa56d17d6f7a9c44f100b609", @nested={0x18, 0x17, 0x0, 0x1, [@typed={0x8, 0x6d, 0x0, 0x0, @pid=r16}, @typed={0x4, 0x4f}, @typed={0x8, 0x7a, 0x0, 0x0, @fd=r6}]}, @generic="7a70ea64f4e430f0615367940394b12d35e0cc79b91a786a58bc2cc0b62c38d61eca21ceed567b671c47b14cdf7b6b0f291c2e5a74b6e90e27aa5ebe7d43e6b4eaa93c812a2336cb7962fd3bcb3006387ffa4cf76bd8941566c5d8996682d42103c7add07b237e52bce7342ee3df323ca8d7e55bb215e0844c0807169e4a8075657a7d68e69f619f7437acfb3a80f8bdfae6ca664d401c78dbbba7175d392676a2dfa333725d8cd5e0d09fdef0fdb4b159acad24fce1d17cc811ad859d5d8adf4e57b68e5dc8f205d0a1fd6200118e5a0e69bf1a48720115bb5cd2f8e4935bdf0c014beeebaca6feeacbf98b44efcb09163ddf1c7499bfd18e63073a9725345ff67f5ad91ac280288077a18cff493a22e94f88f1bbb866696d9402d2927a9dd1cf2f31a5670273353f315f9ad58de2be5a3092f5c69ae5d2ebf1ae78c2488e3c7a438c9aa87db81746a04bdcfa02ea3c6b55f6cc004428e8ca80f983d21c6f03e78f07e06fdc5705262428ad04e8ded179a0c6fe9facec61d654581f9d8dabc0c937909ba09133da08ea69488765a7ce0b9dec8fe04c92c506b25848a361586ec55422a9ef86f9b39cbf961845188bef8292fa87be5cc6173ca3e3e1a1c5292d93faf543806e5d0ec8d0d1855f1bc7610aef241b64da58a76fda03bdd49624826e3d6e52f761911546ac615350fc549bdd160bfddc3d0e44a33c2c2f75179921db94ad59b8b98bbf8898f1075e2761b7754768821a9c182340485e4d8c3cdbe7616d7db1be0960dd85b57db678b07cccd2f36106020e6837ea80bc0a57ecbb4743e01ea208c5b0243dc460f32cd397e609dc30d57f8dd276513f40b32f6e7665ad55b9eab030358a3c3114fc18834aa4e3b409c1fae746b0c253e5dfda3dbefd9c9b6eb3551b1408a888a0389a089cd4dcf79105518a9f5a8567a8e78b6d1a9277481f17b216180b2704ee2379a99ad769124b8d82839c5f797559fd9a1a3a8fb7306375ab3caf82fe71d2c7c1d302d1057956a85960f2aa17cfe670cfdf912ddc88570bbac57accde1cd53e3dcc531f6839a4bc9214d96dd0edc4bf8c7772f77b804a7e5a6913ee14421b1c2d2ac9f3ce88b8aa3b8a3554d1361d8f64e806b00f2cd6c64b0ca2e8c43dab5f5e1a97e9512188c523bf1e1b3a58ae6249d38f88cd1ee24cb2a90c5302e30c00f922f5d28422fc933cc7973f8844fef81960328e6564b54a98ffb552edf2cb40fd69905fb4364775a3179aa21f3f03a776b55519d4155970c36d1d86e121edbb6dbcfc192d2e91354e3bedfffa570063812945161768923a8309a1e6fad144a2e976aa85e76e141f5cdbffe28c2187c040e8ad826771f2bb6ada88c284a1225de579ebb42f7d2f0322979e86d757906f546c93cb089614f6398c3bfb9481186ed677ae9dcbc81737584d8b817e3664789f963b19738ae393438bc8762c670509d71867f48a750808da21814f92f823bce256575cedc4cc38189899fe24a3bb7caa2b4a109f34473aa0a3b411c2c8fb7ff5839c0626c0747f27b5d465c79cabff5e9e6f6c9fd91cbf8ac0edaf902f1382189344d067327cb54cc7871fd7794b5d1f7b18a8d6cee6d0e7b022f69b4b3f577dd851f2cd31e7057f03f51f589df57b58f281280d351b5c7e2ca407079e2b44a728043ff94bd199fbff5f2bc35a4b2c36190f4ff3473e11c7557ff2253a84731160db57dba159c55091653b13a01d9f448a8c90367032eda3b18a4a156981fd9ba476874f9e31841f369f470e788f2a78f04170c39a9b6581d9e7c1623d68a4dbf00925e5eae0ca4e7058b3856c5add223a6da42bbf186516dfeb41eb8664a02312a71e25edebb34589a480c064c0e590e5285cd5436d26990a43b0ce0b138a5c3c582698f73f02001a6f922e9706394c49a3043fcb7c06930122a5528b5c3877d195eaede95777299daf02f1ab4c40ace18613591fdcb83f821b5855f509b046252b27d4ac9432dd8999e73347ab9e7214c2a21355f70ac59e1f2f7807ff3e4fe77b4f46ef81ce058b80a7ea149e25679cfb8962f5df0e61923ee770c252648d69a775b3a992d7117da86ce5f07b82dda2bf8f8d2216fcdceb34847b1748945599a361a590e1f65bc0376c6c0325eeb997bda4b6e1d37fbf0d36999f0fdb1053be0758d956d41e6e22bfe192a6df521a8576f093f90a3da54d52e5d40c2d9ac6cfbcd4151e7a82409fa26fe30ee349190fc6d69c54f10d4ae40f7bd751d4145124b130f3e93aa6b3d506d732e679e9010ad924efb02f974f8b9beec99210a5cf8762168f225ebf925c774f0c57953450dec51f60f5f23298aaed42fb15682f97033d74d72558f451d88040fb1071b4dc9036ca5b1ce735d5919b5baf2ec7a1220f1ae96387d51ebf9903e7cc24075eddbe541b2862af0b8ff33a10d7fe96b6b9ac6d62bbdeab2bd6e8b21661bc2072dfa5117d439a797988347344b82448f85a2f948dc175289600d20a8d217093a087d6c1b096c1ec602300c73e0a9847cc17bdd6b6f0887ace7e1f38faf4ea3b112a620dfba017679c73ee15e41c171af1b2f5dc5192ecbf5bce0b886686f1ac71245360f245480b1d34cbeab8d9640b7eee90971674cdd81044ea2b1ef3677b4d05929475cb8e4fbb809a9668149a8a54da0b30be0ed07a7d08a83e205b237033e03c2b8dd6a788759f7e9d62d570f8b946f8fceb0d4ba937bb3c2aaea6bbfbf814bf6013b8444cf2ff94894e4b0f9bcdf035b7cfc29b1ee74f4523c9f3b66813eac51359b4df8e691fe23f5573285c7e2f72a8420480dad8a93ef52cbc233e429840bfc6819797ebadf241080b6a6c66980acce62ad8cc5603211ba78b63c3ba0c1cd2a7e2b87fed341f02839521afe388022608a0178ff1eba3a7b252a9beaf69124738accf97dc61bd06a8bc474ec97bd1d8c0a433ef791a1c5afad59799f89372846a74a9e99c460390037ece86010bc7b40683263f66dd6b3756bbfe53c516ab354ef7484c981d7a84cb2dce78ce0b0deb6dcba0acbede3f7b280ff4eca4d950fcc4b8190d20ca5b8d132d88bd36039c1141ac502ac91441ed8071b9ba12c90cce983fff59f31ccbb702ff7bd04c1cc5f053fdf3ebffc7056bbb34c5f99dd7c959a77ff2326e73eb33ed5b045c379a4cdba37c139f21c597324cad095cad5cf4920838f7b272829681f1422452d546d5b497ecda8be8c32e323d187d1f48f7ced52803110da1e79e7dcbd65304e5c92606352fb7d73f873707cea79c7f8ca1dc1d4f6b4f231ee426b37eb0e860775bd674021757fb6dc413d36864dcb92e6e8c4e1b5b1dad77ad8e60131f1d90f42727ff46e09c3fe96e5190b274126e0dd8cd784ac86f866266a5aa41ef03cb6b83ec6225d77116cab8567479b569e0a23118088c85333c20acf424983f2ae59f9ab6a28eb07774db2b53c21305dafae28a638f5689b76e5e94fffac7e57c38a8a260224365180f9ede48e9ab697bc8d5dfb13abbe24cae6b9a5d6e8056bf19d3a807886877f9703a16b20c8f10cc373c73c6dab24a05883f9f62fa08bda5c2a2a559e0a054e12f6eafad4528ad3d1c6795a6e96ddb39cd8b7c4d7c7e4cb44a0f7dae9d98c322f85de60b6771813e66eeaadd80ba15bd20f721c68c7af7031aaeff491f22cf4527cc5dda526fa2ef2bf8b71b9df699ae42a960061bdfd2d14351393a7378f32773b098c935ec77e3d79c11f9cfe1fe5f89730970d425d323f5f60ffed51962576172050e57fdebadb2347dca250ff56e4e7787beff31c004325b730ad9adbf75ac573d07eef930d82279111f2116379a13bbdebc5741e18bdc05aa3e6a127dc91e4ccacb56b5c539424e54d7af198bb2b12d186313177ae149d3e3cb1f055b8e0a8dab15857e744364f324a4cb4081841a3b96a3c53a18ce023ad88508860275ce9d818de26bc177b78baf74f21f9fadd54b3967af45a37d89392d85fae660c7389490e709b144455222d9d7551c8af6906b481af8c375dd76013b8680fdcdb4dee58e5312398353b077a39252571a82b8aa63decc9493f5c571ce6cb289d1259706d79343345cf21a3a200f63778901c95b4e16940c3f7cc8a1c3172ffe99d59f11aa103f7bc252b097d32d4d416885754698b98d08e64b250e0bf2cc3d67f0dc138b5b27640e7a32a0e8c22535ca6cec5ae59d1a0e16c0cc49a0106501b37783820c6f6ecc535098b4d222893281032b84f2750d45b890a4c53bb7fd868ba27d69848ddcc8805b837beceb57a43898afb681cfaec5a859e2feaac6337cb7f660468e58b6ca1412b08d9e67dc923e71d4629c7b54c8e8fa205aecd2b75837af4bb393231219c06c5369eb6740dc330f33d2f2ff675f715e19fb2a613fcd16fa31a61d55aa0990ad19eac81538cb0256f37d48885bcfdf46f656d08333a63849f06758a80679d1b05c5a18b7d98ec29eb0135454118fe9a70298e9bda72699825eaf66b687154ba56a737e44d144bcbaccc0d7378a367fdc01b0e0f2501d869052d320ea2830f71143dc29a8e966eca99a3c19a63bfa3551cc6cdb5c3b195c3e1c85231b8992f1ee5dde4370f264613dea8cf3e19542f04947a8b3a83bec89e37530934972f8f36bc5229061c6f3f4d919042883be9ccdb3b6f785c698171ae5f0ecbe70c9de9ecad3f31dcbdd6b17cbb13f02e6999855f0185acb097a595b5cbe9f2ef2301a012a4975319beb430ae8dd6416a63b8dfa0a3f36350a6d9c6b3d9cdfe8787ddca3d5513ea0f6a1c1513035c74ae28fc2d793e8f26fd09c3b41d1f3750b2bf31d4796d2a6cac2a2d2540d952ace07edaaf75bea8adf129e3a55fb3341fb5d0655d53bcadb6f3fda311c2aeea7ca5e7afcf3c1a7a6faff419ff99aa05b14ea710e8a2f53a442334a6aa03f3bb5b1ed7fbc25bc821249db32ba8c83b071cf5cda98ec4f8cec7b3fd3c51a25996b9bb728c80eba9021f5726f8c39004e959c325c5794a0e01bd501e9a472ff290eea205258441879d1155d9e2de4d0eda4604fe7cd1700549fb9abfb6383063fd58ad97ee09f6b14730483cd90e29a4dbeae70b2ede8eea5eb7d553bfb5d86e1b0143c38e9aba6f0842c2f2277e5875161f2f26fbce87e862c228cafa6351bf41eae973d263685d3fb05d37359b7b176c41f00ada4d5882087594b63daad153490f05ff3dc1867f0be78821bd982a0c0284ee120ae164ac5d5f120efd14a89ce264163bd77b3ef36f53caf0cf02c4ed00bfc74670aa90cab6fbc32ca44f5ed18e8e370b950548186242775d982b391a6935db866506d82169aca2269f5593d9605c6e1ecc43feee876aa22656d4778d5ff2222cd736e792d0e65c7b62b4606c125cc2769dc349651c10d261f7035c4d34af81350496988f5a27afec38bd77e0c064b9b491d1fe46c2ffbf5c558a1a08c62f1146b70cffc4957e4f6e72ecdcc27419f44b2a33730965993b941c5dfd3b774f986352c5470c880e6f3221651ff8c79e4b18f3c6f9e750cf3baa4c98b2508b28e7875dbf10979f1c7e23e8a2469f078abb9990295ede3eb90d3a5be366bb462832079f50661dc225a64c525c26004d7cf896e1bb85681fadf5fbc5a0ee768b79ebf3f604d052ed6ecde705e2162151aee8c373f9d91fe1b40586e0b15e9622313d78e01e6262750e6ca482e8f49bb759b4b625eac580cf5ad685dbff18d7f9263cd37c1ff0ac957b684548297351fa05e9c1fc035151f270ea766afc6e761d6103d35f30c883a93f55890bfaf7179843778cf7606ec9a3e7eacb84f", @generic="dc622634356dacd0e76ecfbadf7d3b0c271a19dc792a5f1e3ec95382212f1b61c373fc9c4743174b6c5b7c5eb3c508e1a1954cde7944ce42dddd842107e73ea4edc8cc7ea73cc33e2fb7ee1e27cfcbfb928b0d581547057d7d749472202572289fe95da682f13bd96040cccf0245171bc89ebb0a249bf7e609517cdbabad14c1f6ca3f4556993e82a3878f05f2750305174edce576e6200133aa5f37270f9726351b9b300cc7bd185866a4321b214979528207b3a668d7e59fd302a4cbce50720a56bbf978a8712dfe159c39a748bfb3c0f52044eab136000606c37581d068411c15c5a7c8cde085db5ad8eb5c9cdecf", @generic="8d8a7592ac6209cfda44505504d73d9dc93df91c876461e8a2128da58db6bd4eea742355227b0ad43d0258523b2e4ae78d4bf2586d8405807fc927f0412eebddd8d0dd94d959927aed93779852dab4e69548013a71bcdba110f985f444ef8812e99d8ba8f339247d46c0c85c2eeca6f77d2712905d61745bc340ed4cb3c8e39c00ddb287946c198292afd6fd8c154fd3e85f956478ccfc74932daa398da6a7597cb5f50f4a755e2b5891187eb6948fc4b8d67f5f12c816e8ea5c910010d1eeb59ec6faaaa9a92c0c636986d6acfd73fcfcba0845f940039827662bd3284193c5d7b2ce296c0d5dd2f7488eb177517f348191f0df0cece5762196e3e68330a84c05445accfcc633c9e40145fe02e31cd5cb74b19ce2932d52fd6a8d0ccba023a0fb7595061235ccbea7939f0c37f183f410e97eedacd9ff5e57d53778f399cb69a8c26111807c2b6c3045b089c6516c21d1e4591828cfb123399c05f11d8952845d9b359b79ef6894f11e8175d0a715bc4757495b906209df5dc4fbd48348068370a88630cf27b5f77cf25b4f1027c580e444f5fef4f0e9773558b7b79f21612e4d2d2dd74256511d7b7a6b4e2656722600b878333f02647c53285d141042a1e8d9ffdcfcdd865d890910cfb99ffa2f94378f01d30be975fc0fa880a29e4ab97d2198b2ee4e4bbddf43d57becc9f281d91c70f151ccf39c63c56d4b94c8c52e65aa68b2f113b64c1d9e312e0a1b9fcbd959cc027325626b66e4064abf5085ebd07c344b973cb595d11dcbbbff16215c1d18a4e7c30428d10666f05353cc2c11c8dfc2207ef4b39c75df283d7995085f723175a3e7edda5416c8cc2480cf0e1bfaab4677057b329e8c678af209c85b271bc256b8bd00dad70ba77ec40f2c8df600306bac6cd79a3746e1b5173603cd2f93cf6300f4b4d5a735c0a4e39c7dfc049d50c1d9cf57866ad60badf009925408f6774e679e931df86116016eb03daf695cc38b616c6d637faa3c1b848b01b7391f0feb8f395e51e220c9f75d838283973071ea179640246b07abe5a50db7ee1ea1dcb7fc2abb4bc0500cee0e0993714cfd8e11803cc72b1ef5f5deeb02285789e63b2ac8c4ba299f377a30313fdb09546a9f5477ab1c516fcecf6bdcf6bcc481e78a847945d7404ebd38489ee341aae633cfe7ce53d162fbc84ef5a1caa54c61935acfa12c6bd92abd0bc30ec1a93d5464b78c429fae21a339180ecb2664ece3e66e5de35a99a8849bf6f596bdaaebfb2391585ccbf2cd997f9f468bfb00b08207eaaf595945d7f98e1b182e0acfce36d75530748170df41d77a712ea9eee91dd582aada029e08aaa472109e0e93e4d96592aceae08efcb2e98098763e57536cb0b30de7f2cf7642dc6f37f008d3073ba9c7961c5f6014485f1325466eab47037b7567e80b86299ca160629c452e181c6bce0a8f3e810c693cca783c355f06974cb60745bf3e2ba7711d52f2fb44c94063e51727a54b17b2a94749ead03a0b9d8bfaa0288295924e7e77500d7b417541a3803d73c89094209292b33568d5c38302a4c0399b466ec5c0359a896990d3b10cfb0cc1b4e3b7f7c9ee3acd29607517ae30b9ff67021987884062cd1cab4fbc601abaf41f0f2e7aa167b1f5adde060814c7781c60f3c4d3006ff29a5728127861c90a2e4e0ce24cd8b75992c3122e41684df917625bc5f60aa49ff2fdb709e3c91cfaaf55343c94122e651a666aba009bbb4b6aebbb6608596844a8a3cc4e539d1c607abf8c06bd2492866ef4d5039a0a0dc88bd13407490904f6c2c46aafe5543d4f363f92f000a84e516c2e99370e93ba35a9235c796e803d39287ae5c9635bd81774b223bed6e38da2ddf3b37de9504f755186f72e387ba0a5cd6c53d13c0f75123668a7019af9631c5dc4695f161e5b7d672e1450e52c80a1bcc9da21c0121424fd00c66563ba9e209db1c119b9ed37c3d17cdd83ee71f91f79a933b4e0b602a7641cb971e756f41c598ae02d3747e594ffcb605eecb2ea06943757c539d8fc95ccedc3ee8c22f510bd3fa48aa6d2316a379927379f589bc51a3b016692f8f58f98c683ffff0f1870c556ea9bef5226ff5449fdb8d88b07c522c45265dd91f418165cb854e5a7a0f33fa9534e553e4d76b9c0968595d83dc1903dc30cdaf03a8149fcb075dfc47a32a0b0ae888567fe1751d4483c9573b9ec5fff13729ca140a41637200f62ee19b4787fcd52791669c0094329669b451b7daab0faee27b0e66bd4b19a3f8d4ca0e61378b3564cb2765e1ebd9144a2fa5c00628cdc86cbe528eabce83b7d8dafa4bdd71ccf716e761959e33b2b6dd7810d911ce17b017d9f055e691d93902c36bbe4f0b3b4d040da572a2af9af07ef5ea701989b0022d1b784585c906080f17e66206f6afadbc8dd993530135b88afc2bd7e7a4d125596a1dff31f1b501e008e9268ef7ab01815c3b1f4f79adf0a883f71e68d71a5a6fc090c1b1f6477775a3f3cfd7201ca5b79a40a10790a218c5455993b4b68bccbb01e487bc4c5a2e35e4c32cf84a26c047528e952e4a5c2a77f84636d3058b99252a162ae6c8611dd4ec4d8d353cab9130e58ecab8fd19e2869cb32c15744ce21ef9677e380964ae68a2dcb89717fb495f83479723c08b9e449914263ab7e2898aa8902ad9eb0ad92ecf14bc92ffbc3eb19851ad10e1861a9fdcae9cc37bce532cd478e8d0c07fa01516423ea84cf5f6451cc1456e4604bcc0ccddb88504485f1e0b6ed8e92d1fa4901537b04c601fa17402c34ec8770e145ad721f23e9498cbaeddd029635f678be434ee35a303c67cc43cd65b16ffd9e3f90faae0c12222f90cf176b1511b00cc7617c5ccb706d9edceee19d0ce77fc2632a4546d134cac70433753ad6fd3cf8adae4966577aeff2629ee1897f15ebfc423bfa124c0a8609fffd6ab8821967a5c1b698f529c31af4a8e479a1b6f76a3fe9695689fa98a52f97a502700307482584cf0abe726bab93235f3d0c30a4161cdfbfc7ee5bc7348c8e8633b6c36eed7e99a8c4c4e3135907ae00a9a15481e6ed4305a5ddabc8436d608d5a2a31092e28c498167f614c050e5f49360897d1366d95466de1cd9b7fbe86153838e9087fa0d919adb4ef00049bd1a456140b4b24159c445e53dd90a388c6fc6917f0d4c3ee6ef5512ff640b8bbfa310637e6d261644f3f50dfff3cab3ee46b492ccecf038dcb764bde9fc0c6f36f6b2641950fc0b7fc26087df46671906f94733afa9c4700b4e29166b53b2ea58fe2ccab6be958c5a8706cc8e1a48c4589047ed4a99a660afdd1ce6301c6bb9f1ec2ae5faf1df8722d01287e829a68c1f0b2f194c01a6fe29a28a653fcfc6201a93caf12ea0d28d47ad969450ada27764342a8b8d0f646f97a2cf29673fe333901b76f869a693095fe1e0c31f53ccceb594f62570eda93c43c07dd79317582567bb87a05ba02a8569190cad8d7a61b27fef6c01a882e1b1df7c312f7534d4f14b7bb8fab75f2c163e96b5b105f6e299c465ba603b2bcf9b6028d8f2783d9548fa14c173b2509366dec39de1e67b326eb8842bf9443edcc62b6b3633b63cf9b1090b1809f102e1acf9a9952d32ee345b8d32558b4d467090ab950a20d44f66188d09cc95fc16b7d8dad2601b44ffec8e9926de463e062611708f653c7f81d0c588957693043a739a59bf780db7523f54c6e362ec4705f2ac0d4a95ef4eff03945afd150fd7b40ddd20cdf6f7787c7c367341f7685102606d682c33fc0bff9cd891524cc28cdbcf28935753e3ea1fa0832366b6ff29f020ef24c961335f40f3075cfd2f1184e781a7c2d9391d811d7a519fc7e297d0d02272c269b4e3d4382393e873b02f0be9f4afbddbeb26ebe87d9de9aeb72521962705a0cad303f23b875d79deffcfa8599aa3cbba76b3af0c646b41cfc7648445331fb0503b8406b6dc18634be4a57667a5a62a9239530d6e28e2225c9e969a78fcef4e8474d41d4327e175d293a6400f97da64e17a47f9ee77e278439b3ba348459eb82fe55f8f408bac21a99a4ca3541c6b15759d55303a35bf1c4d28338ff4634051ce6d51f9b3c1765b79478c4d4311726e6dd27525a6080a9da220b4b9ac34091b59d4624b3b66d534900cae16f69ebae47ef8c21654c3f568d94f975c234c7f05b03d940055c9927f5e5ca1f0f98743bf4751595d05dd02027c166b133bd5bb4a5d3e68ed474d84e55ab90138a36d6a2068fe059176bf97c8130f4d3e60598c528cf55256df2c0db950a710dbc4af86f7818de257befa3ce27ff460ad5185de64399219db0721dc26c9601304aedaac28bd0db90e68694c07cf4d9d38582975125bb1ae87e26f745deb5745f5c69f3b85f4457acb0fdcfc473032dec20f9b08034de3e2759f27620749b75d9c46bf14625611dbdab1bf34205da2ee8b702a47d65ba9439239fb4eba2447194661a16ce9e6eb90302e1f5ea8a10494c2bdd3cd17688ea6b49bbe85145a481cdb61750edb7b75295237b9fffc02d63aa44d180f4a59ab6843e71a4c8adf7c43d1dfcd962e7dbde4e64fba8075d23aa3b7e3a5948e55269048609a380f278bfe2f210906894144b6e5597db0c6dcc31a13a910d586646509f52e4f40fa14d58c28fd98fce3b670df61f7525f74605fd110fca3d45058c4ed334ab6473a018189483ef958b7ad4713275558c194096140f327219d05eda0d1f131fc51cfc7fe59772d07e7410d72ad9705805923050088ec2cdc3ff658f847a6525d56cb36ffeb386ca356c27a0182eed9fa6931ceae4b92df566f749dea2882a6da128015031946212644da0fbeb6b1cb1c1d9b58cae1923350eff16ebb08e3680f85214c5744946a9848ae81b088853c7e36d8bf95eb6521003d3ec0daf479edd3eba9964f899ec0b82d84d7beeba289a63689a302fc4845101f648bcfa7a8b7b60609cd5e77e6c96603f250ca5c46507b27da2fec459a632a14505da38fe25c2ea240d38aea00a253f5448f267b5eb913b82a39ac31bf657c9ead114a71353b99c1adc11240caa830632ba1a211f3005cc8c3407ca4c52dfa43a5f616245a64da3e2c5d1aa9f4508141f603e33258a0c9b464cf152cc9d0b96a64465fd97cb31339b9ca25dc4d9ba3c3c1844b4ff6a09f3fc6cfa7ad3cce4b17805483dc9a10b62132a1e1a2ea6d8b8f1c7256e880fbf2e1d1dda23b717fa638a09bbe4699214f7a08f29eb0a8317ed6e446d98608c06456b5541b19442f629b8682642617bcae8570900d22221435728350aca5b62911f4494c84cb09b9088e892e1b41159dc8605ad0cc596de9a209f6402c0fc5b8165eb71e622135ca967d7c81078ee7f4e58f82224cb7a70f72058fc58705c7ac5c2aa5271e3f2718b1ae4eefe76a5279059e87968d7e017d0b9b0c5b0630b0efcc0f93e864ca34703ccec84231fa828d485be05f3eabc5ce247384faacfb7dd825a11aef672e43052617a65b0de860a7f1b3c94a4b3e2a62cd9d10d525c1d0cf0297aa099b46c8f16ff41c86718e9abce7c9414858efec2616f2b4c777bb21e2d24a3aa3e2e4da0c0a817ccd44481a8d4db2a9c02729688956f7462349454c297a628f097b7add8471653fdc8e7fd856172f9db53f5385f7862515881553001225d0442edba0018873aa006d792f4c903b92194c65dafc200de29e37e4dd1c31bb63b925c26e9cbed9a378b1491f77d54d379b0e52f68bce03350f2d199ccb563bbe4f280da1d8b74ca0d65ac9f0e39b97f5c0e4b0bcffef463675fdcb99e3f8af9f319a92c", @nested={0x10d3, 0x78, 0x0, 0x1, [@typed={0x14, 0x4e, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="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", @generic="ddd5aa27dad2d65d21fdfba14326952ee8f3df3a1a55621a03ec28659585bbd0511bc03ea10d9b849576e02cfb5123f227266b101d32ef7c95f03c996fcc33e755280fa6a97c9ec9b4bbd6951d35a827578308834a2e3f74bf817b79b9771abb0335ece39afff1bd71b00763dfa821a61c1263c61620d89afe7ad71a6f5bae080ecb973682d6311b172a23584834b3aed449aec52b311ee027e09af567c4d59ba7236c434d30d5a8464f57", @typed={0x8, 0x18, 0x0, 0x0, @fd=r17}, @typed={0x8, 0x79, 0x0, 0x0, @u32=0x10000}]}]}, 0x335c}, {&(0x7f0000003d00)={0x1c0, 0x17, 0xd20, 0x70bd25, 0x25dfdbff, "", [@typed={0x14, 0x3c, 0x0, 0x0, @ipv6=@loopback}, @nested={0x19c, 0x85, 0x0, 0x1, [@typed={0x2a, 0x25, 0x0, 0x0, @str='/sys/kernel/debug/binder/transactions\x00'}, @generic="265415d4ca7343e5e6ec3fc345908f6b38ece58c082768dcf14aa9d9671cfa784224520e923919e74c0d54d7dcab8496bb193332f924d7097104ac61b3f478163bf8a1a50ef6a82d0c157c7de5010908848b806f521045775249728aa5d51b2e2f5f8e7a367af2673511b94f8a1c5fe85ba11b9ec06d18ae84f10d651d398a92932796022b4a4c80a40f1df9b343264cef520beaeefced42", @generic="ad1f9c5d209bf41b758eb44cc6cfeab61f77b53839a4d66cd37632dc541a81088559b83edf577a74892065fb951e6e7e282816866e7983e426195765c8e75a30e921b9c06ac2544b8b6838375573be47204caa2d463a01665af56a8371d5799441553e789f4d0bf583fb98203adc2dddb6bfdf631464a52bfc2dc0725113ab4060aebb02f4879bd2f253e0919c25ffea0f83c2f841ab8e0304c50619a74a988cfe0f88895941e3f306095645d5051248d3f6e2dd6cf57613f60728f9955671ab0138b65224c9c32c8d0bd6a6bc577e44c3ae97fd"]}]}, 0x1c0}], 0x2, &(0x7f0000004380)=[@cred={{0x1c, 0x1, 0x2, {r18, 0x0, r19}}}, @rights={{0x18, 0x1, 0x1, [r14, r20]}}, @cred={{0x1c, 0x1, 0x2, {r21, 0xee00, r22}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r23, r24}}}], 0x78, 0x8000001}, 0x40040) 03:26:14 executing program 1: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x6, 0xb, 0x4, 0x200000, 0x3, {}, {0x3, 0x0, 0x37, 0x4, 0x8, 0x5, "6ccb4ee9"}, 0x6, 0x1, @fd, 0x2, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x9, 0x420002) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x9e0000, 0x8, 0xfff, r1, 0x0, &(0x7f00000000c0)={0x9909e1, 0x8, [], @value=0x1}}) r3 = dup2(0xffffffffffffffff, r2) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'ip_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{}, {0x0, 0x0, 0x0, @random}]}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000016c0)=0xe8) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x1c, r5, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x8000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f00000017c0)={0x1, 'D'}, 0x2) open(&(0x7f0000001800)='./file0\x00', 0x0, 0x80) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, 0x0, 0x9, 0x401, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040011}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/kvm\x00', 0x181b01, 0x0) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f0000001980)={0x1, 0x6}) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/ttyprintk\x00', 0x680000, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/vcsa\x00', 0x40001, 0x0) setsockopt$inet6_IPV6_PKTINFO(r7, 0x29, 0x32, &(0x7f0000001a40)={@mcast1, r6}, 0x14) r8 = syz_open_dev$admmidi(&(0x7f0000001a80)='/dev/admmidi#\x00', 0x5, 0x8000) fstatfs(r8, &(0x7f0000001ac0)=""/120) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001b40)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000001b80)={0x3, 'caif0\x00', {0x4}}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000001bc0)={0xc768}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001c00)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r7, 0x80082102, &(0x7f0000001c80)=r9) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000001cc0)={0x4, "b09dc414acff4747b87cdc4a886b882b0841f72905dd41308c4be8acedcc8a4f", 0x0, 0x9, 0x400, 0x80008, 0x2}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000001dc0)={0x9e0000, 0x1, 0x4e6, 0xffffffffffffffff, 0x0, &(0x7f0000001d80)={0x9a091c, 0x5, [], @p_u16=&(0x7f0000001d40)=0x3}}) r11 = syz_genetlink_get_family_id$smc(&(0x7f0000001e40)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r10, &(0x7f0000001f00)={&(0x7f0000001e00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e80)={0x28, r11, 0x72b8277f6e3d1e95, 0x70bd27, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4040085) syzkaller login: [ 264.935195][ T9620] IPVS: ftp: loaded support on port[0] = 21 [ 265.097069][ T9620] chnl_net:caif_netlink_parms(): no params data found 03:26:14 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = semget(0x1, 0x2, 0x221) semctl$GETZCNT(r0, 0x2, 0xf, &(0x7f0000000040)=""/47) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc4000, 0x0) r2 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) r3 = accept(0xffffffffffffffff, &(0x7f0000000100)=@generic, &(0x7f0000000180)=0x80) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, 0x3f9, 0x8, 0x70bd25, 0x25dfdbfd, {0x6, 0x1}, ["", "", "", "", "", "", "", "", "", ""]}, 0x18}}, 0x80) set_tid_address(&(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000340)=""/79, 0x4f}, {&(0x7f00000003c0)=""/79, 0x4f}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/220, 0xdc}, {&(0x7f0000001540)=""/41, 0x29}, {&(0x7f0000001580)=""/249, 0xf9}], 0x6, &(0x7f0000001780)=[{&(0x7f0000001700)=""/96, 0x60}], 0x1, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001800)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f0000001b80)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001840)={0x2ec, r5, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_PROBE_RESP={0x2b0, 0x91, "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"}, @NL80211_ATTR_AKM_SUITES={0x18, 0x4c, [0xfac07, 0xfac0e, 0xfac0e, 0xfac17, 0xfac10]}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0x20}, @NL80211_ATTR_AKM_SUITES={0x8, 0x4c, [0xfac10]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x20004018}, 0x4000000) r6 = syz_open_dev$ndb(&(0x7f0000001bc0)='/dev/nbd#\x00', 0x0, 0x2000) prctl$PR_GET_FPEMU(0x9, &(0x7f0000001c00)) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001c40)='/proc/consoles\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000001cc0)='batadv\x00') getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000001e00)=0xe8) sendmsg$BATADV_CMD_GET_GATEWAYS(r7, &(0x7f0000001ec0)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001e40)={0x34, r8, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x1) r11 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r11, 0xc008561b, &(0x7f0000001f40)={0x6b97, 0x81}) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/ubi_ctrl\x00', 0x80000, 0x0) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000002000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r12, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002080)={&(0x7f0000002040)={0x1c, r13, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) r14 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000002100), 0x80800) getsockopt$TIPC_NODE_RECVQ_DEPTH(r14, 0x10f, 0x83, &(0x7f0000002140), &(0x7f0000002180)=0x4) r15 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/dlm-control\x00', 0x80, 0x0) r16 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000004540)=0x0) stat(&(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getpid() stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = syz_open_dev$sndctrl(&(0x7f0000004700)='/dev/snd/controlC#\x00', 0x679, 0x0) fstat(r6, &(0x7f0000004740)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(r1, &(0x7f00000047c0)='./file0\x00', 0x6000, 0x10, &(0x7f0000004800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r24 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000004900)='/dev/rfkill\x00', 0x200100, 0x0) r25 = getpgid(r4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004940)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004b00)=0x0) r29 = accept4$llc(0xffffffffffffffff, &(0x7f0000004b40)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000004b80)=0x10, 0x81000) sendmsg$unix(r15, &(0x7f0000004cc0)={&(0x7f0000002200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000044c0)=[{&(0x7f0000002280)="00e73d8892bbeb0cb1743369474112239c840742e591cfee01d5e8d4de3ddce1528feac7a6db2f3b80afd24efc61325327139436ee383ab524b7aaf1f2", 0x3d}, {&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="fbf85ce8d1b92fc14c640c509fbe2ed5f11a0ac171fb393fae6c3610f78c38e50228dda15ab5c20593fe38cf9aff0ec5a9ef992c", 0x34}, {&(0x7f0000003300)="c4088c3d99f0666a5883c44d57b2116aef07bbf5dbded6161236cc2c273c4997405799678359304ee70b56ec4ca55ac7299bd54bd624c1c7b92b3bad8229d1b0b2bba556211cabfcb3c61c7d4a60c268864d1e4b03bc1bb7f1fc58b8931258ac04793e73763e236d1a7a8a0073560488fca4e7d72f4094af77b640ca749428fa3cd27ffdfd47d71eb2ddfd46701c041531c0145faceebfb739ce019b94d117ee80a85269f013895a79681ab941c28c35dc3366eaecbe544be35877cba2a3193a3457482ba40567f0806b9ca6904dadb607dd49c419583daf1514d84fcf51f64fb15993e80746755a92ea84d3ae8b", 0xee}, {&(0x7f0000003400)="e2c87997aa13f9912335160d3abe9171992c6d625e91e1b07d9d35077a0c3933353822c60a42f1b884af6df2b20dff4972f8c91223dcdcdb01d0deef15b72a88fe76bab775c26239d95f8876ed613c795ced220fcd2b65", 0x57}, {&(0x7f0000003480)="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", 0x1000}, {&(0x7f0000004480)}], 0x7, &(0x7f0000004bc0)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r10, r20}}}, @rights={{0x18, 0x1, 0x1, [r6, r21]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r22, r23}}}, @rights={{0x14, 0x1, 0x1, [r24]}}, @cred={{0x1c, 0x1, 0x2, {r25, r26, r27}}}, @cred={{0x1c, 0x1, 0x2, {r28, r10}}}, @rights={{0x18, 0x1, 0x1, [r11, r29]}}], 0xe8, 0x40080}, 0x40) [ 265.171742][ T9623] IPVS: ftp: loaded support on port[0] = 21 [ 265.314914][ T9620] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.323768][ T9620] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.332566][ T9620] device bridge_slave_0 entered promiscuous mode [ 265.351878][ T9620] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.359015][ T9620] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.373974][ T9620] device bridge_slave_1 entered promiscuous mode [ 265.413626][ T9628] IPVS: ftp: loaded support on port[0] = 21 [ 265.430755][ T9620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.473120][ T9620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.545144][ T9623] chnl_net:caif_netlink_parms(): no params data found [ 265.565003][ T9620] team0: Port device team_slave_0 added 03:26:15 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x103, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa8, 0x4, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x7c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x40f}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xd99}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x7ff}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xc37}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7fffffff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x27}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000001c0)={0x0, 0x2, 0x401, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ocfs2_control\x00', 0x125200, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000380)={0x7, 0x8b, "57ecffafd1bdc353a5de2200f02c86067f64ebc40a150d9aa7c6aaf7da46e824e6c991f62fe8e1b112faa38c875107de4c7071f042de027b937eb412c1261a4f50ebaba3f2cbd7e27674402b3ddbaebde1a5a1e2b0635bbf6b36e4ee6063186ce5aef53f1fb86a9c72449b5fe5c5a2e8db137f8e00b88b727f1e1ec70a5c9406dff46a37b29b88f6c13e11"}) r3 = accept$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f00000004c0)=0x8, 0x4) fgetxattr(0xffffffffffffffff, &(0x7f0000000500)=@random={'security.', '}\x00'}, &(0x7f0000000540)=""/51, 0x33) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv0\x00', r1}) r4 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x1, 0x202100) r5 = getpgrp(0xffffffffffffffff) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000600)=r5) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000006c0)={0xffffffffffffffff}) r8 = syz_open_dev$mouse(&(0x7f0000000700)='/dev/input/mouse#\x00', 0x80000001, 0x440) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000740)={0x7e6, 0x0, 0x4, 0x2, 0x2, {0x0, 0x7530}, {0x3, 0x1, 0x1f, 0x6, 0x3, 0x3f, "b9de1195"}, 0xbb87, 0x1, @userptr=0x6, 0x0, 0x0, 0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000880)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x70, 0x0, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x107d}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r4}, {0x8, 0x1, r9}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4008000}, 0x8800) r10 = syz_open_dev$radio(&(0x7f00000008c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_PARM(r10, 0xc0cc5616, &(0x7f0000000900)={0xb, @output={0x0, 0x1, {0x101, 0x1}, 0x8, 0x9}}) ioctl$EXT4_IOC_SETFLAGS(r9, 0x40086602, &(0x7f0000000a00)=0x404011) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$SIOCX25SDTEFACILITIES(r8, 0x89eb, &(0x7f0000000a40)={0x7, 0x3, 0x3, 0x8, 0x3, 0x15, 0x23, "8abf91aa03512b5ad9b26cfe9d7e0c4d111cccee", "f5afab8c8f94a9a490b509a41befe2593221767c"}) r11 = syz_genetlink_get_family_id$nbd(&(0x7f0000000ac0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r8, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x2c, r11, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x400}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x40010) r12 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XCRS(r12, 0x8188aea6, &(0x7f0000000bc0)={0xa, 0x7fffffff, [{0x5, 0x0, 0x2}, {0x2, 0x0, 0x7}, {0x9, 0x0, 0x1}, {0xfff}, {0x101, 0x0, 0xc}, {0x4, 0x0, 0x101}, {0x6, 0x0, 0x5}, {0xffff, 0x0, 0xe000000}, {0x25af0dd8, 0x0, 0x4}, {0x9, 0x0, 0x80000000}]}) r13 = syz_open_dev$mice(&(0x7f0000000c80)='/dev/input/mice\x00', 0x0, 0x80400) bind$bt_l2cap(r13, &(0x7f0000000cc0)={0x1f, 0x8, @any, 0x3, 0x2}, 0xe) r14 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKREPORTZONE(r14, 0xc0101282, &(0x7f0000000d00)={0x3, 0x2, 0x0, [{0x2, 0x1f, 0x1, 0x0, 0x7c, 0x0, 0x3}, {0x6ee, 0x5b21, 0x401, 0x2, 0x6, 0xfc, 0x34}]}) [ 265.596315][ T9620] team0: Port device team_slave_1 added [ 265.717192][ T9620] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 265.724348][ T9620] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.750703][ T9620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 265.786264][ T9620] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 265.801754][ T9620] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.837564][ T9620] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 03:26:15 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x14100, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x8001, 0xfffffffeffffffff, 0x3}) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0x2) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000000c0)=""/4096) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f00000010c0)=0x1) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000001100)=0x67) r2 = syz_open_dev$admmidi(&(0x7f0000001140)='/dev/admmidi#\x00', 0x101, 0x800) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000001180)={0x0, 0x200, 0x1, 0x0, 0x0, [{{r2}, 0x2690}]}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vcsa\x00', 0x127fc1, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000001200)={{0x4, @name="8d4874de275ca0448bda3b7cebf93705c542c363c469a39f328f2f55ca4bea0d"}, "f9c2c5fc0c2227516005d715a8e23fccad33c44e6a9d5debc8f43d7789b56e19", 0x1}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001300)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000001340)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f00000013c0)={r5, &(0x7f0000001380)=""/60}) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vga_arbiter\x00', 0x101, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000001440), &(0x7f0000001480)=0x4) r7 = dup(0xffffffffffffffff) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f00000014c0), 0x4) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vcsa\x00', 0x80, 0x0) ioctl$NS_GET_PARENT(r8, 0xb702, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x3c, 0x13, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}]}, 0x3c}}, 0x2000c001) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000001640)={0x5, 0x81, 0x8, 0x1, 0x6}) timerfd_create(0x7, 0x80000) pipe(&(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_FREE_MR(r9, 0x114, 0x3, &(0x7f00000016c0)={{0xcf79, 0x80000000}, 0x29}, 0x10) write$FUSE_NOTIFY_INVAL_INODE(r8, &(0x7f0000001700)={0x28, 0x2, 0x0, {0x3, 0x5, 0x3}}, 0x28) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm-monitor\x00', 0x940, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r10, 0x4040ae75, &(0x7f0000001780)={0x8, 0x0, 0x4}) r11 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r11, 0x84, 0x1b, &(0x7f00000017c0)={0x0, 0x9b, "41f53e0e262a55e5d184272dbba41edf013f8254e34655e073e2cf9200e9b31faf8aa459c7a62f375fb7e13dcd6fc507d55afa56dde68453de3e25c83f2100e64ff1db83b66aa44506719cfe84ebf6a5651b0e53b6576be21c1ea673a20e252712810c9476980f9751317856e6b241e532ee9d6f933bba18fbe037cc2f63d80e92841cd68abbbade922a19394d32f49f27cbd2a58baaaa20a4666e"}, &(0x7f0000001880)=0xa3) r12 = dup(0xffffffffffffffff) ioctl$TIOCPKT(r12, 0x5420, &(0x7f00000018c0)=0x6) [ 265.945942][ T9633] IPVS: ftp: loaded support on port[0] = 21 [ 265.994688][ T9620] device hsr_slave_0 entered promiscuous mode [ 266.050259][ T9620] device hsr_slave_1 entered promiscuous mode [ 266.124219][ T9623] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.134464][ T9623] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.142671][ T9623] device bridge_slave_0 entered promiscuous mode [ 266.176264][ T9628] chnl_net:caif_netlink_parms(): no params data found [ 266.201544][ T9623] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.208660][ T9623] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.217728][ T9623] device bridge_slave_1 entered promiscuous mode 03:26:16 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000000c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r3 = geteuid() statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x800, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f0000000280)={0x78, 0x0, 0x1, {0x2, 0x0, 0x0, {0x4, 0x3f, 0x800, 0x2, 0x8e, 0x1, 0x1, 0x7, 0x3f, 0x3000000, 0x1, r3, r4, 0x0, 0xfffffffd}}}, 0x78) r5 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x1000, 0x2) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000340)=0x0) write$FUSE_ATTR(r5, &(0x7f0000000380)={0x78, 0x0, 0x7, {0x101, 0x200, 0x0, {0x3, 0x41b, 0x0, 0x8ab, 0x7, 0x9, 0x6, 0x44, 0x1e387830, 0x7fff, 0xda, r6, r4, 0x4, 0x40}}}, 0x78) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000400)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000540)=0x5) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r8, 0x4008ae8a, &(0x7f00000005c0)={0x1, 0x0, [{0xb, 0x400, 0x5fda, 0xfffffff8, 0x5}]}) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-monitor\x00', 0xc500, 0x0) getsockopt$TIPC_IMPORTANCE(r9, 0x10f, 0x7f, &(0x7f0000000640), &(0x7f0000000680)=0x4) r10 = openat$urandom(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/urandom\x00', 0x200, 0x0) finit_module(r10, &(0x7f0000000700)='GPL\\\x00', 0x2) r11 = syz_open_dev$vcsn(&(0x7f0000000740)='/dev/vcs#\x00', 0x7af, 0x101080) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r11, 0x111, 0x5, 0x0, 0x4) semget$private(0x0, 0x0, 0x82) r12 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm-monitor\x00', 0x8e72b4652c4d3e46, 0x0) accept$phonet_pipe(r12, &(0x7f00000007c0), &(0x7f0000000800)=0x10) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000840)=0x0) pidfd_open(r13, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000008c0)=0x0) sendmsg$AUDIT_SET(r8, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x34, 0x3e9, 0x200, 0x70bd26, 0x25dfdbfc, {0x8, 0x1, 0x1, r14, 0x8000, 0xfffff800, 0x2, 0x0, 0x81}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) openat$kvm(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/kvm\x00', 0x100, 0x0) [ 266.265152][ T9637] IPVS: ftp: loaded support on port[0] = 21 [ 266.302301][ T9623] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.335819][ T9623] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.479379][ T9623] team0: Port device team_slave_0 added [ 266.497352][ T9628] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.504876][ T9628] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.514298][ T9628] device bridge_slave_0 entered promiscuous mode [ 266.523786][ T9623] team0: Port device team_slave_1 added [ 266.546982][ T9628] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.554262][ T9628] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.562108][ T9628] device bridge_slave_1 entered promiscuous mode [ 266.614255][ T9628] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.630497][ T9642] IPVS: ftp: loaded support on port[0] = 21 [ 266.652908][ T9623] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 266.660124][ T9623] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.686291][ T9623] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 266.703548][ T9628] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.727293][ T9623] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.734441][ T9623] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.762786][ T9623] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 266.801233][ T9628] team0: Port device team_slave_0 added [ 266.812125][ T9628] team0: Port device team_slave_1 added [ 266.853157][ T9633] chnl_net:caif_netlink_parms(): no params data found [ 266.905449][ T9628] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 266.912584][ T9628] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.938580][ T9628] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 266.957767][ T9628] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.964844][ T9628] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.992987][ T9628] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.093550][ T9623] device hsr_slave_0 entered promiscuous mode [ 267.140125][ T9623] device hsr_slave_1 entered promiscuous mode [ 267.189969][ T9623] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 267.197759][ T9623] Cannot create hsr debugfs directory [ 267.211993][ T9637] chnl_net:caif_netlink_parms(): no params data found [ 267.233230][ T9620] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 267.296386][ T9620] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 267.396531][ T9620] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 267.463146][ T9620] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 267.613705][ T9628] device hsr_slave_0 entered promiscuous mode [ 267.670335][ T9628] device hsr_slave_1 entered promiscuous mode [ 267.709944][ T9628] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 267.717537][ T9628] Cannot create hsr debugfs directory [ 267.885630][ T9633] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.893005][ T9633] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.903314][ T9633] device bridge_slave_0 entered promiscuous mode [ 267.914683][ T9633] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.921860][ T9633] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.929558][ T9633] device bridge_slave_1 entered promiscuous mode [ 267.987419][ T9633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.000916][ T9642] chnl_net:caif_netlink_parms(): no params data found [ 268.036656][ T9633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.061785][ T9637] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.068929][ T9637] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.077548][ T9637] device bridge_slave_0 entered promiscuous mode [ 268.086788][ T9637] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.093964][ T9637] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.103995][ T9637] device bridge_slave_1 entered promiscuous mode [ 268.147187][ T9633] team0: Port device team_slave_0 added [ 268.193255][ T9633] team0: Port device team_slave_1 added [ 268.228356][ T9637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.240935][ T9637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.250278][ T9623] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 268.320830][ T9633] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.327809][ T9633] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.354963][ T9633] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.382770][ T9623] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 268.424905][ T9633] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.432523][ T9633] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.460491][ T9633] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.483104][ T9642] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.491781][ T9642] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.500352][ T9642] device bridge_slave_0 entered promiscuous mode [ 268.522028][ T9623] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 268.572451][ T9623] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 268.615927][ T9642] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.623269][ T9642] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.631355][ T9642] device bridge_slave_1 entered promiscuous mode [ 268.641812][ T9637] team0: Port device team_slave_0 added [ 268.687605][ T9637] team0: Port device team_slave_1 added [ 268.714325][ T9628] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 268.763565][ T9642] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.833290][ T9633] device hsr_slave_0 entered promiscuous mode [ 268.880508][ T9633] device hsr_slave_1 entered promiscuous mode [ 268.919959][ T9633] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 268.927608][ T9633] Cannot create hsr debugfs directory [ 268.949623][ T9628] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 269.004709][ T9642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.016824][ T9637] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 269.025052][ T9637] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 269.051625][ T9637] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 269.064949][ T9637] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 269.072562][ T9637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 269.098662][ T9637] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 269.122219][ T9628] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 269.164461][ T9628] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 269.277578][ T9642] team0: Port device team_slave_0 added [ 269.328280][ T9642] team0: Port device team_slave_1 added [ 269.403579][ T9637] device hsr_slave_0 entered promiscuous mode [ 269.470365][ T9637] device hsr_slave_1 entered promiscuous mode [ 269.509914][ T9637] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 269.517574][ T9637] Cannot create hsr debugfs directory [ 269.544504][ T9620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.604143][ T9642] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 269.611716][ T9642] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 269.638143][ T9642] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 269.651669][ T9642] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 269.658620][ T9642] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 269.685287][ T9642] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 269.707750][ T9620] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.747281][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.756444][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.770054][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.778517][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.787627][ T3575] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.794801][ T3575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.803106][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.811879][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.820430][ T3575] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.827496][ T3575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.880038][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.933473][ T9642] device hsr_slave_0 entered promiscuous mode [ 269.980168][ T9642] device hsr_slave_1 entered promiscuous mode [ 270.029950][ T9642] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 270.037527][ T9642] Cannot create hsr debugfs directory [ 270.077113][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.132032][ T9623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.139791][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.212246][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.222656][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.249527][ T9633] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 270.314195][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.322492][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.330999][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.338667][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.347471][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.356214][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.365141][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.388287][ T9623] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.395723][ T9633] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 270.469633][ T9633] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 270.538496][ T9628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.552778][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.563260][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.579142][ T9633] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 270.653480][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.664583][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.673708][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.682859][ T3575] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.690110][ T3575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.699058][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.739096][ T9637] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 270.783004][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.792658][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.801685][ T3577] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.808769][ T3577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.841780][ T9637] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 270.884456][ T9637] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 270.932494][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.941590][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.949259][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.983729][ T9628] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.000801][ T9637] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 271.066053][ T9642] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 271.112631][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.124196][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.133181][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.141893][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.150862][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.159569][ T2692] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.166697][ T2692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.174892][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.183863][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.212507][ T9642] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 271.242659][ T9642] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 271.293392][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.302291][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.310779][ T2692] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.317830][ T2692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.341858][ T9642] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 271.396155][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.404766][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.413932][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.423424][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.432098][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.477677][ T9623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 271.489338][ T9623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.505804][ T9620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.514637][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.522387][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.529748][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.538508][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.547006][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.570937][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.580703][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.623051][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.632697][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.641403][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.683510][ T9628] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 271.695035][ T9628] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 271.718742][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.727119][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.736219][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.744950][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.755056][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.770685][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.781087][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.819000][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.828650][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.836867][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.844381][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.886503][ T9633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.896665][ T9623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.935319][ T9628] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.949529][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.958265][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.967510][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.975996][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.995571][ T9620] device veth0_vlan entered promiscuous mode [ 272.045252][ T9642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.062413][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.072616][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.082949][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.092424][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.107484][ T9620] device veth1_vlan entered promiscuous mode [ 272.122352][ T9633] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.143412][ T9642] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.161656][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 272.171040][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.178912][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.202991][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.212592][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.221815][ T2693] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.228859][ T2693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.236714][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.245762][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.254465][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.263005][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.297421][ T9637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.306784][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 272.315602][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.325045][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.334246][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.342277][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.351999][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.361067][ T2693] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.368104][ T2693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.375930][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.384673][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.393413][ T2693] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.400524][ T2693] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.408708][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.417650][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.426342][ T2693] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.433463][ T2693] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.452578][ T9623] device veth0_vlan entered promiscuous mode [ 272.476109][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.487358][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.496385][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.505268][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.514518][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.523095][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.531966][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.540292][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.549244][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.557676][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.566412][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.578785][ T9628] device veth0_vlan entered promiscuous mode [ 272.589308][ T9623] device veth1_vlan entered promiscuous mode [ 272.607515][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 272.617161][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.625876][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.633914][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.644949][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.653918][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.675748][ T9628] device veth1_vlan entered promiscuous mode [ 272.687936][ T9637] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.699997][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.708882][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.723505][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.731585][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.740209][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.780298][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.793509][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.803775][ T3575] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.810907][ T3575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.818949][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.827547][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.856562][ T9620] device veth0_macvtap entered promiscuous mode [ 272.886755][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.896548][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.906248][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.915853][ T3562] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.922968][ T3562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.933449][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.942353][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.951041][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.959262][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.968307][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.976917][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.985633][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.994321][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.003192][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 273.012212][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 273.021522][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 273.030501][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.043380][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.065855][ T9620] device veth1_macvtap entered promiscuous mode [ 273.083335][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.091853][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.099642][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 273.107849][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.117693][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.128403][ T9642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.154522][ T9628] device veth0_macvtap entered promiscuous mode [ 273.178126][ T9620] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.191458][ T9628] device veth1_macvtap entered promiscuous mode [ 273.198772][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.208347][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.217106][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.225897][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.234477][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.243597][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.252443][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.293286][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.302177][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.313291][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.322007][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.331759][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.340359][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.347738][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.358253][ T9637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.368531][ T9620] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 273.383958][ T9623] device veth0_macvtap entered promiscuous mode [ 273.396204][ T9628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.408448][ T9628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.422855][ T9628] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.448334][ T9642] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.460074][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.468110][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.477726][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.487146][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.498518][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.508163][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.516097][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.528223][ T9633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.557378][ T9628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.568358][ T9628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.581219][ T9628] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 273.590003][ T9623] device veth1_macvtap entered promiscuous mode [ 273.620557][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.628642][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.638665][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.774817][ T9623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.786559][ T9623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.796552][ T9623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.807338][ T9623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.818592][ T9623] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.829557][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.841023][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.848424][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.861798][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.891570][ T9623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.902502][ T9623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.913034][ T9623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.923855][ T9623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.935528][ T9623] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 274.062632][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.073194][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.083173][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.092351][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.123548][ T9637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 274.137680][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.147317][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.156750][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.178687][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.194577][ T9633] device veth0_vlan entered promiscuous mode 03:26:23 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r1) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r1}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000080000000300000070020000400100004001000000000000000000000000000040010000d8010000d8010000d8010000d801000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140010000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000000000000000000006800706879736465760000000000000000000000000000000000000000000000697036677265300000000000000000000000000000000000000000000000000076657468305f766c616e00000000000000000000000000000000000000000000000700000000000040005443504f50545354524950000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800434c415353494659000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000822bf47a04c00a4add6a4b0ddf819535f192c8228b11ae4f35b574b397060157acdfa9104066eb4e0ffb829a5cf1f8a65d3108082da12b3544bc149393d7317ac237865acd053cbb80bbe9cd16e3789bae961d76cbe6b9"], 0x2d0) [ 274.237498][ T9665] Unknown ioctl -1067952625 [ 274.251956][ T9665] Unknown ioctl -1067952625 [ 274.271177][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.278877][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 03:26:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x4, 0x9, 0x4, 0xfffffffb, r2}, 0x10) syz_mount_image$f2fs(&(0x7f0000000380)='f2fs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 274.364595][ T9671] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 274.455642][ T9633] device veth1_vlan entered promiscuous mode [ 274.470473][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 274.507410][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.526833][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.536510][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.544448][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.575380][ T9642] device veth0_vlan entered promiscuous mode [ 274.599003][ T9678] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 274.607473][ T9678] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 274.624151][ T9678] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 274.653952][ T9678] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 274.727190][ T9642] device veth1_vlan entered promiscuous mode [ 274.784999][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 274.795342][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 274.805237][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.815027][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.824255][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 03:26:24 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x983, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000140)={0x7, 0x4, 0x1, 0xfffffffc}) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x2, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x0, 0x0, 0x2}, 0x40) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000000b06010200000000000000000000000009000000000500010007000000ee81e88c87509b1a9902fa48f09c8f0fda3b73a2601dc48313842de1ee7ccce9180fd018d8c15ee65cc8936fc14c75d03b4e3cc8784e00fe92e1e5823bf8a58b39092083f28ccc072d4983ca7d7d0f01384051d762b8ef3fc4e4fe02d1e0831f8b3a05e3be23410bc3e61164e5bafda8eeed835ea588fab1648e11f6210a25c54a6dc465da18ccfc8370c9a9af5904e09e4779a8b712df04b38ff87953e4397d14c06eed11df7f89ca4ae3feb5008c9c806714544d56767bce0ad6414cc2d1cd91f37037bf465ee0a34da78e02450d"], 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000300)={0x0, 0x4, 0x4, 0xcb39cb3085a12e2, 0xffff01ef, {0x77359400}, {0x0, 0x2, 0x6, 0x80, 0x5, 0x5, "0d3f0c12"}, 0x3ff, 0x4, @planes=&(0x7f0000000240)={0x7, 0x6, @fd=r4, 0x10001}, 0xe7e9, 0x0, r5}) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r6}, 0x3c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ufs\x00', 0x290480, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000180)=0x15) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) [ 274.833429][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.857361][ T9633] device veth0_macvtap entered promiscuous mode [ 274.883345][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 274.970625][ T9633] device veth1_macvtap entered promiscuous mode [ 275.002941][ C1] hrtimer: interrupt took 43799 ns [ 275.038378][ T9637] device veth0_vlan entered promiscuous mode [ 275.075332][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 275.088078][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.106855][ T9637] device veth1_vlan entered promiscuous mode 03:26:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x61c1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x4, 0x4, 0x210, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x102}, 0x3c) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad7, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x9c02}], 0x0, 0x0) [ 275.135577][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.143528][ T9693] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 275.145855][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.167549][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 275.176568][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.192240][ T3566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.218581][ T9642] device veth0_macvtap entered promiscuous mode [ 275.248945][ T9633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.267127][ T9633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.277721][ T9633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.300899][ T9633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.319576][ T9633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.336527][ T9633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 03:26:25 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x36) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)='./bus/file0\x00') mkdir(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000200)='./bus/file1\x00') mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fedbdf250000000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb54208000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000805) unlink(&(0x7f00000002c0)='./bus/file0\x00') [ 275.357011][ T9633] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 275.390890][ T9633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.438722][ T9633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.509702][ T9633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.617438][ T9633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.671487][ T9633] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.741337][ T9633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.772367][ T9706] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 275.810318][ T9633] batman_adv: batadv0: Interface activated: batadv_slave_1 03:26:25 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0x0, 0x0, 0xf0, 0xf0, 0xf0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x40000, 0x0, 0x2, 0x0, 0x5}}, @common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) [ 275.882752][ T9642] device veth1_macvtap entered promiscuous mode [ 275.916699][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 03:26:25 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x208900, 0x0) sendmmsg$unix(r0, &(0x7f0000000300)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="2d3ace8216d74079975743dfecec8a8429ec74b589433c44433369c39fdc6bfae2bc2f4dbf31bc4530d568c49516e6c3", 0x30}, {&(0x7f00000001c0)="3d32faf621394fe67d09ba3162fab4313b8a2f5ebf933ea7b4a11d0ca0aef15a73ee6fd811ef6bda73acabeff518835cbdae3801d815ccd34a9314e69d87e7e3f7ea99ea97be62eb2e77fc4cff85677a66925c28e5016383c92c1f03c7c0bf8ab68be12b19291b77efc8550174f025050aa5e9484e7acc33378e17c6218b632e22571295084bbbfdb2b2ca03", 0x8c}, {&(0x7f00000003c0)="9295707ca3debb62c44caab7fe3c99ae45d6d8395cf4900df308a736c78caa6e595a5bf1366523b8912e70c83928a578534757122ae8d5695b9e4dcafe55b04318452ebbc45716e2e912b43c6bb92f080a5a7baf95178dbfa3df3ecfac4fc23f23c04ade7dafd3d06277d4cd50b6992bed93d8be5ad5f3f14be8de5c068bff27363172f7df3301782ab49cb42cc1a0379cf47c923dc56c033d729938950f311468285f4095aea723b449c64a3eb14c525a2a65", 0xb3}], 0x3, 0x0, 0x0, 0x40000}], 0x1, 0x20000084) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x275a, 0x0) write$FUSE_DIRENTPLUS(r1, 0x0, 0x0) [ 275.935423][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 275.966047][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.012531][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.032391][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.049728][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.064907][ T3575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:26:25 executing program 1: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 276.195375][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.221974][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.265262][ T9637] device veth0_macvtap entered promiscuous mode [ 276.298138][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.340171][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.388268][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 03:26:26 executing program 1: userfaultfd(0x80000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000400)={0x81, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes=&(0x7f0000000000)={0x0, 0x0, @fd}, 0xff00}) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) [ 276.465578][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.505166][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.599672][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.631201][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 276.636931][ T9693] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 276.660354][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.706746][ T9642] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 276.831627][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 276.852779][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.923693][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.961577][ T9637] device veth1_macvtap entered promiscuous mode [ 277.100648][ T2693] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.173502][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.233849][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.296053][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.356586][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.407992][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.455259][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.518305][ T9642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.570058][ T9642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.629948][ T9642] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 277.720959][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.741585][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.776846][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.798117][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.818584][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.830670][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.841878][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.852720][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.862929][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.873771][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.884883][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 277.896053][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 277.908893][ T9637] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 277.926867][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.942799][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.962782][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 277.992130][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.002909][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.014682][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.024882][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.035671][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.045913][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.056691][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.066928][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 278.077731][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 278.101814][ T9637] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 278.115308][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.130374][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:26:28 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x983, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000140)={0x7, 0x4, 0x1, 0xfffffffc}) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x2, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x0, 0x0, 0x2}, 0x40) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000000b06010200000000000000000000000009000000000500010007000000ee81e88c87509b1a9902fa48f09c8f0fda3b73a2601dc48313842de1ee7ccce9180fd018d8c15ee65cc8936fc14c75d03b4e3cc8784e00fe92e1e5823bf8a58b39092083f28ccc072d4983ca7d7d0f01384051d762b8ef3fc4e4fe02d1e0831f8b3a05e3be23410bc3e61164e5bafda8eeed835ea588fab1648e11f6210a25c54a6dc465da18ccfc8370c9a9af5904e09e4779a8b712df04b38ff87953e4397d14c06eed11df7f89ca4ae3feb5008c9c806714544d56767bce0ad6414cc2d1cd91f37037bf465ee0a34da78e02450d"], 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000300)={0x0, 0x4, 0x4, 0xcb39cb3085a12e2, 0xffff01ef, {0x77359400}, {0x0, 0x2, 0x6, 0x80, 0x5, 0x5, "0d3f0c12"}, 0x3ff, 0x4, @planes=&(0x7f0000000240)={0x7, 0x6, @fd=r4, 0x10001}, 0xe7e9, 0x0, r5}) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r6}, 0x3c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ufs\x00', 0x290480, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000180)=0x15) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) [ 278.533187][ T9745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:26:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) ioctl$DRM_IOCTL_MODE_GETCRTC(r4, 0xc06864a1, &(0x7f0000000100)={&(0x7f0000000000)=[0x14ab, 0x1, 0xffff, 0x1f], 0x4, 0x1, 0x18, 0x8, 0x5, 0x9, 0x187, {0x10001, 0x6, 0x2, 0x6, 0x800, 0x1ff, 0x8, 0x20, 0xc9, 0x101, 0xfc01, 0x0, 0x80000000, 0x277c, "440a78b1555fc0c4c24221c1c872618fa35e6a35ff204a79d4d79ab7b1079f24"}}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}]}}) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) setsockopt$bt_hci_HCI_TIME_STAMP(r7, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r7, 0x551f) mq_notify(r7, &(0x7f00000002c0)={0x0, 0x12, 0x2, @thr={&(0x7f0000000040)="e31b708a5267f70a3e7f26b49ae903d1770f", &(0x7f0000000280)="17cb4ca903e668c446878c35eb243a4073f628a045c4a73cfd803b0c8029"}}) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$l2tp(r8, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000200)=ANY=[@ANYBLOB="030000080000000000000052357be5fff8730a693cb93ed54272c5e23cb2e1ec5787d2c1f211039ef5b9fc3b7014aed6fb98dc107c9bdc970fa758c4faa7d508d3f250096c09"]) 03:26:28 executing program 1: userfaultfd(0x80000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000400)={0x81, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes=&(0x7f0000000000)={0x0, 0x0, @fd}, 0xff00}) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) 03:26:28 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x983, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000140)={0x7, 0x4, 0x1, 0xfffffffc}) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x2, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x0, 0x0, 0x2}, 0x40) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000000b06010200000000000000000000000009000000000500010007000000ee81e88c87509b1a9902fa48f09c8f0fda3b73a2601dc48313842de1ee7ccce9180fd018d8c15ee65cc8936fc14c75d03b4e3cc8784e00fe92e1e5823bf8a58b39092083f28ccc072d4983ca7d7d0f01384051d762b8ef3fc4e4fe02d1e0831f8b3a05e3be23410bc3e61164e5bafda8eeed835ea588fab1648e11f6210a25c54a6dc465da18ccfc8370c9a9af5904e09e4779a8b712df04b38ff87953e4397d14c06eed11df7f89ca4ae3feb5008c9c806714544d56767bce0ad6414cc2d1cd91f37037bf465ee0a34da78e02450d"], 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000300)={0x0, 0x4, 0x4, 0xcb39cb3085a12e2, 0xffff01ef, {0x77359400}, {0x0, 0x2, 0x6, 0x80, 0x5, 0x5, "0d3f0c12"}, 0x3ff, 0x4, @planes=&(0x7f0000000240)={0x7, 0x6, @fd=r4, 0x10001}, 0xe7e9, 0x0, r5}) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r6}, 0x3c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ufs\x00', 0x290480, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000180)=0x15) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) 03:26:28 executing program 5: userfaultfd(0x80000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000400)={0x81, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes=&(0x7f0000000000)={0x0, 0x0, @fd}, 0xff00}) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) [ 279.070425][ T9764] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 279.119711][ T9761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) io_destroy(r0) 03:26:29 executing program 5: userfaultfd(0x80000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000400)={0x81, 0x5, 0x2}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @planes=&(0x7f0000000000)={0x0, 0x0, @fd}, 0xff00}) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) 03:26:29 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) socket$xdp(0x2c, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x120, 0x2, 0x9, 0x301, 0x0, 0x0, {0xa, 0x0, 0x2}, [@NFCTH_STATUS={0x8}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_QUEUE_NUM={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={[], [], @loopback}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @remote}}}]}, @NFCTH_TUPLE={0x4c, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0xe}}}}]}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x20004000}, 0x40010c4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sync() 03:26:29 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r6, @ANYRESDEC=r7, @ANYRES16=r8, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r5]]], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x0) dup3(r5, r2, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) [ 280.031493][ T9783] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 280.070716][ T9783] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:26:29 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x0, 0x0, 0x1000}, 0x10) r1 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) shmat(r1, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_LOCK(r1, 0xb) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 280.283568][ T9790] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:26:30 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r6, @ANYRESDEC=r7, @ANYRES16=r8, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r5]]], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x0) dup3(r5, r2, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) [ 280.352230][ T9790] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:26:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x88}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000240)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x5, 0x7, 0x4, 0x108, 0x4000000, {}, {0x5, 0x0, 0x4d, 0x4, 0x7, 0x9, "803fd437"}, 0x29, 0x4, @offset=0x4, 0x8000, 0x0, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x8, 0x9, 0x2, 0x31cf, 0x0, r1, 0x9, [], 0x0, r2, 0x5, 0x2}, 0x40) 03:26:30 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x0, 0x0, 0x1000}, 0x10) r1 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) shmat(r1, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_LOCK(r1, 0xb) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:26:30 executing program 4: timer_create(0x3, &(0x7f0000000240)={0x0, 0x11, 0x0, @thr={&(0x7f0000000280)="4d194bd50646e91625031ed286f322fdf8ff7a38d07ba4bdeae2210da56e39f0bae6af862ee19ece127d2179719c339c34e99bdc77d2e5a00a152bababb4fe11a808b516550df82732d6aa029f5cb43f0d66f08e7ae2f1fc6880cdb02770f68786fde1084521a3618f90c0e82ef47d8cdb39ad86d5eaa25fbd5d362d16664dcea2a4e893869a59760a97ec7f1cb60e045ba1f984cb7dc490780cbea6da6238507f3a8103a4b97577fe6dba6f6d02", &(0x7f0000000140)="10e062183f9a19eda6f556d59ed1d4db6fe0463f124f7074a816da5198c8cf93ea40996de71d9fdf57e217e7f34cb8815e059eb6d41997668395bb9221830fa7ab340d86e2d0d3c26b904e0668e2e032f887dd6ffddd89079037a307171ccc9290981a87e5a9d9664eb5d0f468ed95e267e0185dfde62aa75981e6759c8b911ea2b009eb014499c824b9c5b601e0fe24639ff4dd4d21aa972c5fee4224a686d3b9c892cd1582cadad5275559c9bd31e04ed54c59ac95ea558cb652d66407dc5884c59ff2abd34e53892fbf4d122ab05bb4451f1fa263f36a1f133c4c"}}, &(0x7f00009b1ffc)) futex(&(0x7f0000000100)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r1, 0x0) tkill(r0, 0x1000000000016) 03:26:30 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r6, @ANYRESDEC=r7, @ANYRES16=r8, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r5]]], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x0) dup3(r5, r2, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) 03:26:31 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x983, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000140)={0x7, 0x4, 0x1, 0xfffffffc}) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x2, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x0, 0x0, 0x2}, 0x40) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000000b06010200000000000000000000000009000000000500010007000000ee81e88c87509b1a9902fa48f09c8f0fda3b73a2601dc48313842de1ee7ccce9180fd018d8c15ee65cc8936fc14c75d03b4e3cc8784e00fe92e1e5823bf8a58b39092083f28ccc072d4983ca7d7d0f01384051d762b8ef3fc4e4fe02d1e0831f8b3a05e3be23410bc3e61164e5bafda8eeed835ea588fab1648e11f6210a25c54a6dc465da18ccfc8370c9a9af5904e09e4779a8b712df04b38ff87953e4397d14c06eed11df7f89ca4ae3feb5008c9c806714544d56767bce0ad6414cc2d1cd91f37037bf465ee0a34da78e02450d"], 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000300)={0x0, 0x4, 0x4, 0xcb39cb3085a12e2, 0xffff01ef, {0x77359400}, {0x0, 0x2, 0x6, 0x80, 0x5, 0x5, "0d3f0c12"}, 0x3ff, 0x4, @planes=&(0x7f0000000240)={0x7, 0x6, @fd=r4, 0x10001}, 0xe7e9, 0x0, r5}) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r6}, 0x3c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ufs\x00', 0x290480, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000180)=0x15) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) 03:26:31 executing program 3: sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x40000, 0x4}, 0x0) sched_setattr(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x0) socket$unix(0x1, 0x1, 0x0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r3) rt_tgsigqueueinfo(r2, r3, 0x12, &(0x7f0000000080)={0x14, 0x5, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000140)={r7, @in={{0x2, 0x4e21, @multicast1}}, 0x2472, 0x9c, 0x1000, 0x1f, 0x7fffffff}, &(0x7f0000000200)=0x98) ptrace(0x4206, r2) prctl$PR_SET_PTRACER(0x59616d61, r2) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r10 = open_tree(r1, &(0x7f0000000100)='./file0\x00', 0x8000) close(r10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:26:31 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r6, @ANYRESDEC=r7, @ANYRES16=r8, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r5]]], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x0) dup3(r5, r2, 0x0) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) 03:26:31 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r6, @ANYRESDEC=r7, @ANYRES16=r8, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r5]]], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x0) dup3(r5, r2, 0x0) [ 282.164684][ T9824] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:31 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r5, @ANYRESDEC=r6, @ANYRES16=r7, @ANYPTR64, @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r4]]], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x0) 03:26:31 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x0, 0x0, 0x1000}, 0x10) r1 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) shmat(r1, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_LOCK(r1, 0xb) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:26:32 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:32 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 03:26:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="4400000010f01eff0000000000cc7618460000006ac710eca44f362ccb77c6bc8b03b6e48c57c03f54ddd0fc0bc3b3efbd222c09ed06003333ad81de5290687975f0ea8828f2a903009b", @ANYRES32=0x0, @ANYBLOB="00000000000000000000001c00120074610200000c0002007b04000000000000", @ANYRES32, @ANYBLOB="c2fe2e46", @ANYRES32, @ANYBLOB="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"/448], 0x7}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x7, 0x7f, 0x0, 0x80000000, 0x9, 0x9, 0x2, 0x1, 0x81, 0x78, 0x3f, 0x0, 0x2, 0x7, 0x7, 0x2, 0x40, 0xcd, [], 0x6, 0x6}) 03:26:32 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x98, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3f}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x48}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x7d}]}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x98}}, 0x0) 03:26:34 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000000)={0x18, 0x0, 0x0, 0x20000000}) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)=0x0) wait4(r4, &(0x7f0000000080), 0x80000000, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x1, 0x40100) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) dup2(r5, r6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1000) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f00000001c0)={0x3}, 0x1) 03:26:34 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 03:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0x8) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r4, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) sendmsg$can_bcm(r4, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r4, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) gettid() 03:26:34 executing program 0: utime(&(0x7f0000000000)='./bus\x00', &(0x7f0000000180)={0x1000, 0x1ff}) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x3f7, 0x10, 0x70bd2c, 0x25dfdbfb, {0x5, 0x5, './bus', './bus'}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x20000000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}}, 0x90) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000380)="fdc4bbcb02b7bfe22effced8b2aff0fa558d13a8472af7e1e6b649084359f57e6e08e12ece43cbc0f1b286d98acd6ee1ca80913b3ead912b51d9817a2abee2f621e8141f3918dcaba30057c180fa4f1c66abfae3f341e0a23433a5ccf372783a057260a2a152f9f8bbf2b35b2789f0c7c5e4dacec1c22cab603641", 0x7b) fallocate(r2, 0x0, 0x40000000, 0x10000101) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000001c0)={0x8001, 0x5, 0x5d03, 0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000240)=0xb76) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000200)={r4}) 03:26:34 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x983, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000140)={0x7, 0x4, 0x1, 0xfffffffc}) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x2, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x0, 0x0, 0x2}, 0x40) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000000b06010200000000000000000000000009000000000500010007000000ee81e88c87509b1a9902fa48f09c8f0fda3b73a2601dc48313842de1ee7ccce9180fd018d8c15ee65cc8936fc14c75d03b4e3cc8784e00fe92e1e5823bf8a58b39092083f28ccc072d4983ca7d7d0f01384051d762b8ef3fc4e4fe02d1e0831f8b3a05e3be23410bc3e61164e5bafda8eeed835ea588fab1648e11f6210a25c54a6dc465da18ccfc8370c9a9af5904e09e4779a8b712df04b38ff87953e4397d14c06eed11df7f89ca4ae3feb5008c9c806714544d56767bce0ad6414cc2d1cd91f37037bf465ee0a34da78e02450d"], 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000300)={0x0, 0x4, 0x4, 0xcb39cb3085a12e2, 0xffff01ef, {0x77359400}, {0x0, 0x2, 0x6, 0x80, 0x5, 0x5, "0d3f0c12"}, 0x3ff, 0x4, @planes=&(0x7f0000000240)={0x7, 0x6, @fd=r4, 0x10001}, 0xe7e9, 0x0, r5}) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r6}, 0x3c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ufs\x00', 0x290480, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000180)=0x15) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) 03:26:34 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x0, 0x0, 0x1000}, 0x10) r1 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) shmat(r1, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_LOCK(r1, 0xb) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:26:34 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 284.478777][ T9871] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:34 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = open(&(0x7f0000000240)='./file0\x00', 0x20141042, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$xdp(0x2c, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)={'#! ', './file1', [{}, {}, {}, {0x20, 'threaded\x00'}, {0x20, '),nodev)'}, {0x20, 'threaded\x00'}, {0x20, 'threaded\x00'}, {0x20, 'threaded\x00'}], 0xa, "be2247e1ee31f216a54d58685678db3628c2293c698b2262df4b526b620d6cf2062c3b2700d84e43e4c5de4e51b832df005cd6e4963caac348f291703238440f08eba3fd5ae0c4cc6d34ed0dc84718acea29e7bddfead66e5e7be96992c9a15ad081af96c9cc7d8436b7acaafd946c93783a36822d"}, 0xb4) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) [ 284.655807][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 284.655818][ T26] audit: type=1800 audit(1584069994.338:31): pid=9863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16546 res=0 03:26:34 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x6000) r1 = add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='/dev/cachefiles\x00', r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 284.864991][ T26] audit: type=1800 audit(1584069994.338:32): pid=9873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16546 res=0 03:26:34 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 285.024992][ T26] audit: type=1800 audit(1584069994.338:33): pid=9884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16546 res=0 [ 285.073866][ T26] audit: type=1800 audit(1584069994.718:34): pid=9889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16588 res=0 03:26:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4abb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000000), 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 03:26:35 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:35 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:35 executing program 0: ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x800) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e21, 0x7, 0x4e24, 0x0, 0x2, 0x80, 0x80, 0xed, 0x0, r3}, {0x7fffffff, 0x3, 0x1, 0x5afc, 0x3, 0x81}, {0x401, 0x4, 0x0, 0x1}, 0x1, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x26}, 0x4d6, 0x33}, 0xa, @in6=@empty, 0x3504, 0x1, 0x2, 0x1, 0x6, 0x2, 0xbb0}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0)='batadv\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r4, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2001, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 03:26:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0x8) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r4, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) sendmsg$can_bcm(r4, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r4, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) gettid() 03:26:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000000)) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 03:26:36 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0112f60000000020070000006a370001000003000000008e10"], 0x0, 0x1b}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:26:36 executing program 4: syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffff80d5, 0x2, &(0x7f0000000080)=[{&(0x7f0000000100)="b6ed6d44e355e4a5d61c0e5cb0db3699e549f41a767dad02a7f79b141d1392d535b52de5ef89da9519450a39fa529878674692cf206276e54dfbc9ba9df0a3697d361537b949b767c032d6c826a2bcd91ad49fd6308ad6af7aafa9a3dbee10e18ae6d2174700262281874aedcafc4b1a87f4f47abb05955677aa26b684c8fa187f6f0cb238853d6d64a23158814729e15043f3f5a1cdec4521216fa7e34f70a75a4b774ea94b3c1d245a96db5cb758abe33f286ff923e9b400d27aedbb", 0xbd, 0x5}, {&(0x7f00000002c0)="9057898100341d6049c4362a06bf8735a8271ac12e53b6a3b94431488ebf09ad95d7b9cdc15ba878d1bd02d45d0585b405d836fefe52c02bc3db3d756d6e16a1302e542e1198283443f85849987a524a3c0072ac3aea44c395d32a6ddd5913061a849c175ce9456344928c63b28c631248e158ae749daa2733cebf19b9f1b1795fe3e24e5710f73d7d21efa5fc79d8f46b4598172d30e553e7814a7696d9e26eb68e039b", 0xa4, 0x4}], 0x8002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) 03:26:36 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:36 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:36 executing program 3: syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$netlink(r0, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r3, 0x400, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x8}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000810) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000080)=0x8) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc0045516, &(0x7f0000001000)) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001000050700a554a48500000000002288", @ANYRES32=0x0, @ANYBLOB="03000000000000001800120008000100736974000c00020008000100", @ANYRES32=r4], 0x38}}, 0x0) 03:26:36 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:37 executing program 0: ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x800) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e21, 0x7, 0x4e24, 0x0, 0x2, 0x80, 0x80, 0xed, 0x0, r3}, {0x7fffffff, 0x3, 0x1, 0x5afc, 0x3, 0x81}, {0x401, 0x4, 0x0, 0x1}, 0x1, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x26}, 0x4d6, 0x33}, 0xa, @in6=@empty, 0x3504, 0x1, 0x2, 0x1, 0x6, 0x2, 0xbb0}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0)='batadv\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r4, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2001, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 03:26:37 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:37 executing program 2: ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x800) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e21, 0x7, 0x4e24, 0x0, 0x2, 0x80, 0x80, 0xed, 0x0, r3}, {0x7fffffff, 0x3, 0x1, 0x5afc, 0x3, 0x81}, {0x401, 0x4, 0x0, 0x1}, 0x1, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x26}, 0x4d6, 0x33}, 0xa, @in6=@empty, 0x3504, 0x1, 0x2, 0x1, 0x6, 0x2, 0xbb0}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0)='batadv\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r4, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2001, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 03:26:37 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:37 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@mpol={'mpol', 0x3d, {'local'}}, 0xa}], [], 0x30}) r0 = getuid() r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r2, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x9, &(0x7f0000001680)=[{&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000000140)="7e695c9c2341e852b9f34b043cc75791123ca8c2171bcff56b926af17d6f715e66a74b84b1c9dae653fbabc53464a476a66b67efd1944259e145a2f4aef71f97243b06f36b21a8c1fe0a6007ef5ca202d69ca43eed1858722149b0a24d696b5ae36f9f1a9cd8d7b2c78c93c61f5aaa200b3cb9074670482e45371f4724464ad1752ca9e5d018de516b6b21ddc902b59085ae6991634a76e18c010e746f7c1150f811c1e8db83b88fcbc68019eaefb637d21e6b12e26c1a0dbea11f32", 0xbc, 0x6}, {&(0x7f00000000c0)="0cce9066b061903fc6c46bf371e34db3e18f40ce4cd237c85851bc370f5d52986e6ba9d55aafcacc9ae1d9", 0x2b, 0x80000002}, {&(0x7f0000000200)="356f0060e4dc03b3a157ace3adb5e5a90a4206bd59aa8a5d755b403747068e125bb45d7a5b77d6753f57501b67c17acda465f141f373b8f824fbc1ec70e1723c04c57cf9312e2a10417dd6d275aad2765b479ef6293b3452e0f0", 0x5a, 0x9}, {&(0x7f0000001380)="cfcc2729bb5189b69269dc3a479bef1dcfc830226a6fb9a096659a484119f2e81b1ed39398c89e9b515fdbabea55e83d5c540b5b8771465e06a52d453dd4adf2f95cd241f185e5881052e365cec178336417ee87b7ef2bd425bd1b0441ee596d818d8b43f5f9fd4ccccb3f05cdf34da6829f6f375461890a76de7bf2a79da7b41fc6c4fcadd12b1f794565c66e47a6eabe26bbdad287a207bca0f763bb76c5e4369905cbba4d963cf5132ded748852f4c542c2034be1c6c83d5a424ca674a21073cb74083249b43eb43b4bd2e4e486dcedd7cdb150a0cba8d1b947d0683519d4663b4c", 0xe3, 0x1}, {&(0x7f0000001480)="0aae1dfc86cc19b57aea2e6b38cd5263e5d3a51226fc07cc6311129df1d0494dd43bf843ea4cd71ad064f113e29cf33a2cf45516905aaf39baad92dcce1f48e2e94b111cff46e4c7e308f83d3e4406b94fad3f2daeca82fe48ba52a6086b9a0c999866e696acfd5964c19d9487bc24b591d17d2734997d14ba3bf023490e44c4d7b7dd19a021f91453ab9ea019088885d28576152292dda2e6937d9e32fe371fc34c0b85ef122041a38efe6261b0cee3d6c811e52932ebcd9b2b56e4d79b187d89d3e6730590aab6b3efbb7085695b61250f5a8e951096e4755d97e5c8274a686711dd0d2504a1b39139", 0xea, 0xffffffffffffffe0}, {&(0x7f0000000280)="305913b52f1f6e87b029fb6a27b3793e90c99e32d52d3b33520a056f391eca7831f6cc7a9a56eee20d907a35119ab84f1c6903c4250e9b6f124c108095daca0b9e9faa5175473a66533aec0fa2ed6e22baf64bf02c2d658b01c9e13453cbbd4e21c5c2ddf81132097ebc1bd92ef97fb689f568792884eea586f9a3b2c4f430faca657824832013264a1a2501efd86c6d440362ad3725abaac3e073de0c19d0d001bc3fcda8ec733d3b6b686330bddb5e537e", 0xb2, 0x91}, {&(0x7f0000001580)="64650121b978e86ff2829513e3eb7203b248a58a89188d4ad954531b81b9fc583382cac140e0861d36faa8e9b8bd51349a66f303a73518af051bc9be20ef3e05c55b0eae84c144ca65af3f0a9e4535def12e8b21b89def80cf9002a6118f6ccaf2cde3293e22c663a3fe8f7ad270471d325dada71c6cf7388f7ee538b5aa4aebbc82b70e5a5f8f3477cd585750aec7875b5279bf50e78c767803c5e8060e25f334df0b22", 0xa4, 0x1}, {&(0x7f0000001640)="6953b8cbb3ebe270c7441a3a7a3dc8277d6bd6d01f00acd4", 0x18, 0x8001}], 0x800000, &(0x7f0000001840)={[{@nobarrier='nobarrier'}, {@nodiscard='nodiscard'}, {@subvol={'subvol', 0x3d, '!nodevEkeyring)\xc9'}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x1b}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) [ 288.119313][ T9986] tmpfs: Bad value for 'mpol' 03:26:37 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:38 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_SET_POLICY={0x8}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x16}]}, 0x2c}}, 0x4801) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') [ 288.382174][ T9986] tmpfs: Bad value for 'mpol' 03:26:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), 0x4) 03:26:38 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) syz_open_dev$char_usb(0xc, 0xb4, 0x3) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000200)={0x0, {{0xa, 0x4e20, 0x9, @loopback, 0x7}}, 0x1, 0x4, [{{0xa, 0x4e24, 0x6, @loopback, 0x8}}, {{0xa, 0x4e20, 0x1c00000, @ipv4={[], [], @local}, 0x7}}, {{0xa, 0x4e22, 0x8000, @local, 0x40}}, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x3d}, 0x3}}]}, 0x290) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) iopl(0x3) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 03:26:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), 0x4) 03:26:38 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:39 executing program 0: ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x800) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e21, 0x7, 0x4e24, 0x0, 0x2, 0x80, 0x80, 0xed, 0x0, r3}, {0x7fffffff, 0x3, 0x1, 0x5afc, 0x3, 0x81}, {0x401, 0x4, 0x0, 0x1}, 0x1, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x26}, 0x4d6, 0x33}, 0xa, @in6=@empty, 0x3504, 0x1, 0x2, 0x1, 0x6, 0x2, 0xbb0}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0)='batadv\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r4, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2001, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 03:26:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), 0x4) 03:26:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) setsockopt$bt_hci_HCI_TIME_STAMP(r8, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r8, 0x551f) setsockopt$inet6_tcp_buf(r8, 0x6, 0x1c, &(0x7f0000000240)="c688a5487feb2c948f1f8de5c284fce2342ff3bffd5b78c0a5e93347b3121c1d25a27900b88a9f0a19c752a3e782faa9103e74b91224ca1bd082b03fc22e00722e829b64eeafeb3c025b5b0ebf43471c568d19356cfeb6d17b5a293e0c43193f04e12bde7c2e8c0a3143e4e8218b8304dedb89af8fa072dfdd8adebe247ae03702602356e44105537c63df8768e2a9eb98847450992398d9", 0x98) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x64, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}]}, 0x64}}, 0x0) r10 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) preadv(r11, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/214, 0xd6}, {&(0x7f00000006c0)=""/194, 0xc2}, {&(0x7f00000007c0)=""/146, 0x92}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x8, 0x0) 03:26:39 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="c662afeff060d8a4", 0x8, 0x1, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:39 executing program 2: timerfd_create(0x9, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x141c1, 0x418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) open(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) creat(0x0, 0x0) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) mkdirat(r1, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4e0940, 0x0) renameat(r1, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18, 0x7fff, 0x0, 0x0, 0x21, r4}, 0x40) open$dir(0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) setsockopt$inet6_tcp_int(r5, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r5, 0x29, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r6, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r7, 0x7fff) sendfile(r6, r7, 0x0, 0x8000fffffffe) 03:26:39 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000801}, 0x20040800) fsetxattr(r0, &(0x7f0000000000)=@random={'trusted.', 'mime_typeem1\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x2) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1018401, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x3, 0x0) sendto$llc(r1, &(0x7f0000000180)="b1e9f634364c48b082806a1297e90446fca1cb32", 0x14, 0x4, &(0x7f00000002c0)={0x1a, 0xfffe, 0x1, 0x9, 0x80, 0x4, @multicast}, 0x10) socket$packet(0x11, 0x3, 0x300) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x4803, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x78, r3, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x34, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x43a1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x0) 03:26:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), 0x4) 03:26:39 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 289.466414][T10040] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:26:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 03:26:39 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/65) 03:26:39 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={r4, 0x6}, 0x8) 03:26:39 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 289.950652][T10064] cgroup: Unknown subsys name 'nfsd' [ 290.023773][T10069] cgroup: Unknown subsys name 'nfsd' 03:26:40 executing program 0: ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x800) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e21, 0x7, 0x4e24, 0x0, 0x2, 0x80, 0x80, 0xed, 0x0, r3}, {0x7fffffff, 0x3, 0x1, 0x5afc, 0x3, 0x81}, {0x401, 0x4, 0x0, 0x1}, 0x1, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x26}, 0x4d6, 0x33}, 0xa, @in6=@empty, 0x3504, 0x1, 0x2, 0x1, 0x6, 0x2, 0xbb0}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000007c0)='batadv\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3efc882c22996f041d103af500"}, 0x1c) sendmmsg(r4, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2001, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 03:26:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) 03:26:40 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 03:26:40 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/65) 03:26:40 executing program 1: pipe(&(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 290.400792][T10081] cgroup: Unknown subsys name 'nfsd' 03:26:40 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/65) 03:26:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 03:26:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 290.680915][T10095] cgroup: Unknown subsys name 'nfsd' 03:26:40 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={r4, 0x6}, 0x8) 03:26:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:40 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x8200) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2374830400e0d200c6e778abff1f082120"], 0x9) fdatasync(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r5, 0x2008002) sendfile(r4, r5, 0x0, 0x200fff) 03:26:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 03:26:40 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/65) 03:26:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:40 executing program 4: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000009, 0x31, 0xffffffffffffffff, 0x0) 03:26:41 executing program 4: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 291.322947][T10123] cgroup: Unknown subsys name 'nfsd' 03:26:41 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r0, 0x551f) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 291.577850][T10139] cgroup: Unknown subsys name 'nfsd' 03:26:41 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={r4, 0x6}, 0x8) 03:26:41 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:41 executing program 4: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:41 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r2) migrate_pages(r2, 0x80, &(0x7f0000000040)=0x4, &(0x7f0000000080)=0x10001) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x113, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) setsockopt$bt_hci_HCI_TIME_STAMP(r6, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000180)={0x2e, 0x4, 0x0, {0x1, 0x4, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) ioctl$USBDEVFS_GET_SPEED(r6, 0x551f) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) 03:26:41 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 291.986803][T10161] cgroup: Unknown subsys name 'nfsd' 03:26:41 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:41 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) dup(0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:41 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 292.208877][T10177] cgroup: Unknown subsys name 'nfsd' 03:26:42 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={r4, 0x6}, 0x8) 03:26:42 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:42 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='nfsd\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:42 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:42 executing program 0: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) getpgid(0xffffffffffffffff) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="58000000020608180000000000000000000000000c000780dc0f0000000000000900020073797a3100000000050001000700000012000300686173683a6e65742c706f7274000000050004001df2ffff0400050002000000"], 0x58}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r3, r4, 0x4}) syz_emit_ethernet(0x50, &(0x7f0000000200)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f000", 0x1a, 0x3a, 0xff, @rand_addr="e514d84000000500", @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @empty, [{}]}}}}}}, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x309200, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="110e00000000000000000100000000000000014100000020001700000000000000002574683a76657468305f746f5f7465616d000000e89780f16ba17b"], 0x3c}, 0x1, 0x0, 0x0, 0x4020000}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000900)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00042cbd7000fbdbdf25010000000000000009410000004c0018ffffff0173797a310000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000002000"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) sendmmsg$alg(r5, &(0x7f0000000340)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="37ca912b4294a6250fd1e121463b03c22a3f514e5d1c5ec396aa2b3ca933a841a4788de4e37cc922c73fbcc5fc252dfde70669bc8d86202910632488741260cb", 0x40}, {&(0x7f0000000940)="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", 0x1a4}, {&(0x7f0000000500)="e87ca31fb0a7e44767c88941b25c6bf5f2036588a1bf568b29f05e575faa0174861c7f8da3210c84a7207d10e584f43c37d09402d6617f88273b9b13ed1003b489ab205f54072766fafea52727831087d621688c1df1a30156282cdac3cab6f57e86eda4320d9e5ba88f6cb4f2645ad9d3153cbe95151c2028091856743a124cb6a781a17333fa03470eda977b401099abc31c5b10b326a5b81e20df025d120c97c58d66c840f9715584d7a4d2ffee639e916ecba1082b3906321a9093a91167f0fff21fd300a3016789019cc14a3c84b9", 0xd1}, {&(0x7f0000000600)="5947ba533c066201e8924600fee40f7c6afd8d5cf012ca1b6f6b9d1d6ba728d052c05b808418bb69839cf1c5072a4e5fcd3cdeea66292b1cde805fc7a95f16a1d10656311ae7cfaabad643847d2882ea853b96505354ca68737a656253b41f16d5e629b17a2d3e9e9b692dc4c8927e9452170c5aca749185063165c8eb6bc1352598c244c06923d4fed954c0e5c4e306085e", 0x92}], 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x138}], 0x1, 0x4000) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r8, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 292.715919][T10201] cgroup: Unknown subsys name 'nfsd' 03:26:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x40004) 03:26:42 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 292.741940][T10205] tipc: Enabling of bearer <%th:veth0_to_team> rejected, media not registered 03:26:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:42 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') [ 292.863665][T10205] tipc: Enabling of bearer <%th:veth0_to_team> rejected, media not registered 03:26:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 292.976587][T10222] cgroup: Unknown subsys name 'nfsd' 03:26:43 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x40004) 03:26:43 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x290380, 0x116) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}]}, 0x40}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0xa10000, 0xa36e, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909cf, 0x3, [], @ptr=0x8}}) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) 03:26:43 executing program 3: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 293.634176][T10244] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:26:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x40004) 03:26:43 executing program 3: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') [ 293.703684][T10244] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:26:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:43 executing program 3: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:44 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x40004) 03:26:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:44 executing program 3: mknod$loop(0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:44 executing program 0: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)=""/102, 0x66}, {&(0x7f0000000300)=""/70, 0x46}, {&(0x7f0000000380)=""/181, 0xb5}, {&(0x7f0000000780)=""/204, 0xcc}, {&(0x7f0000000880)=""/236, 0xec}], 0x5, &(0x7f0000000980)=""/65, 0x41}, 0x10000) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x1) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000480)='reiserfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000c00)=[{&(0x7f0000000580), 0x0, 0x7f}, {&(0x7f0000000a00)="9d4d434f8e09e69b3de9a9c3a0b9319c70cdfe397ce088e5f5ad0c164989d580a93bbc71ee71719af4b29b59ff0c7785c9197e5c410ca418635e4be9a2c55e83902246c63bd4b01040e47b8d88d6be928a6deabad3c83ab30e9b7e951245dca4a679711dd099a5b6becf25bd8cc1", 0x6e}, {&(0x7f0000000a80)="a93fdeceda97abe8933bb896d7d3147e00edd9809ecd43a424ef1fa2dca521bf87b03d459ae91df8fe7cab820357b5ba78c378cd6652013c31ee0376f4a06293e174d55c2b6887977744e7d8a071e8d47e1546f901abb05ef3687933958342bc6b742844df6cfb26424e0802f66e5c10e9aebf04949230f351c66c868895c8ffcee2f6dd443e9dbc", 0x88, 0x800}, {0xffffffffffffffff, 0x0, 0x2cc3}, {&(0x7f0000000b40)="7f7fd0bc4cd1da37303a53fd3010d7e0ad01c1871a505db18a80de7a8f8e8270488c5f01d1b9c9c7f1bd94e92e01f261257f81943c3883fe26e74378acba61524fa2a59f6141ab80062923900c32478b434c4eb7a38bb03d0abc5b409c1456a0d8e5052580f307c5f432cb7adf226923e5004464dd24840066d31f777914326acbb63272469a24f92525d10aa70ee4119399797ccfb0147008455693a4", 0x9d, 0xa60}], 0x21010a0, &(0x7f0000000c80)={[{@usrjquota_file='usrjquota=syz'}, {@resize_auto='resize=auto'}, {@hash_tea='hash=tea'}, {@tails_small='tails=small'}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@errors_ro_remount='errors=ro-remount'}], [{@fowner_gt={'fowner>', r2}}, {@pcr={'pcr', 0x3d, 0x8}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@seclabel='seclabel'}]}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000280), &(0x7f0000000440)=0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1, &(0x7f0000000640)=""/223, 0xdf}, 0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xe43) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f53ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400248ff100005001201", 0x2e}], 0x1}, 0x0) [ 294.563816][T10282] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:26:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x40004) 03:26:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:44 executing program 3: mknod$loop(0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x80000, &(0x7f0000000340)={'trans=unix,', {[{@privport='privport'}, {@version_9p2000='version=9p2000'}, {@cache_none='cache=none'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'bond_slave_0\x00'}}, {@uid_gt={'uid>', r2}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x8, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x3c}}, 0x0) 03:26:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x40004) 03:26:45 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:45 executing program 3: mknod$loop(0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000380)=@gcm_128={{0x303}, "ead0d405d4d4cdbe", "35186e7006edec6c692da58e2200", "ed6c1516", "58220516591e4f8c"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000380)=@ccm_128={{}, "a5e38bb06bcce68f", "1739c68482ba57aa96c20db66632c8b9", "e2f4d449", "f88c4ae80800e8e9"}, 0x28) 03:26:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x82) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/155, 0x9b}], 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) setsockopt$bt_hci_HCI_TIME_STAMP(r6, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r6, 0x551f) setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f0000000340)="f1cbe3ec8efbed80d149974b31e665171786e3b816589b634edebc7b9034319c2d4d317f86cd9beb15a36cb949f10d04d02b0463ca36bb7887dbf8f1953062f036eff12486feda60e6abb1fa36d28d470e61505b222dbdf403e6f3f8f7328cc612e86e12c346dbdd661d1a69bfb693ed5c7325e4a93c5855002361dc817b311fba40221189b094c20cec308fc27e965905288ba97a5b", 0x96) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) close(r1) r7 = socket$inet(0x2, 0x4, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) r8 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @local}}, 0x0, 0x20000000005, 0x2}, 0xd8) bind$inet(r7, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000000), 0x9f) recvmsg(r7, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc10}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x300) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) [ 295.738954][T10334] cgroup: Unknown subsys name 'nfsd' 03:26:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:46 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000385b12790ac76021017bfc0fb6c8598d000800000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x800) 03:26:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 296.445488][T10364] cgroup: Unknown subsys name 'nfsd' 03:26:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x58, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x58}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, 0x3, 0x3, 0x202, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x6}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x401}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x7ff}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x6}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x3}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0xff9}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x3}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20880}, 0x4) 03:26:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 296.681834][T10383] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 296.734833][T10385] cgroup: Unknown subsys name 'nfsd' [ 296.872659][T10383] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:26:46 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:26:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:46 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', 0x0, &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getpid() ptrace$poke(0x5, 0x0, &(0x7f00000000c0), 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) shutdown(0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r5, 0x1}, 0x8) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 03:26:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', 0x0, &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 297.994957][ T26] audit: type=1800 audit(1584070007.678:35): pid=10403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16718 res=0 03:26:47 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:26:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', 0x0, &(0x7f00000001c0)='cgroup\x00', 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, 0x0, 0x0) 03:26:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x6, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getpid() ptrace$poke(0x5, 0x0, &(0x7f00000000c0), 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) shutdown(0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r5, 0x1}, 0x8) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 03:26:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, 0x0, 0x0) 03:26:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 298.961348][ T0] NOHZ: local_softirq_pending 08 03:26:48 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:26:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$sndseq(r0, 0x0, 0x0) pipe(&(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000040)={0x4, 0x2}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="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"/803], 0x328) 03:26:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, 0x0, 0x0) 03:26:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1000005, &(0x7f0000000240)='nfsd\x00') 03:26:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 03:26:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:49 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x600800, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="110e00000000000000000100000000000000014100000020001700000000000000002574683a76657468305f746f5f7465616d000000e89780f16ba17b"], 0x3c}, 0x1, 0x0, 0x0, 0x4020000}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x21020080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r2, 0x300, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x18, 0x17, {0x1, 0x0, @l2={'ib', 0x3a, 'ip_vti0\x00'}}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000040)={'vcan0\x00', 0xe67}) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x18, 0x140e, 0x301, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x2}]}, 0x18}}, 0x0) 03:26:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40004) [ 299.497170][T10505] tipc: Enabling of bearer <%th:veth0_to_team> rejected, media not registered [ 299.564304][T10509] tipc: Enabling of bearer <%th:veth0_to_team> rejected, media not registered 03:26:49 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, &(0x7f0000000240)='nfsd\x00') 03:26:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 03:26:49 executing program 0: msgget(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x6000, 0x800, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) 03:26:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x40004) [ 300.081860][T10524] cgroup: Unknown subsys name 'nfsd' 03:26:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 03:26:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40004) 03:26:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) 03:26:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:50 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 03:26:50 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x40004) 03:26:50 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) io_setup(0xb, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffffbff, 0xffffffffffffffaf) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x0, r4, 0x1}) io_setup(0x5f, &(0x7f00000000c0)=0x0) io_setup(0x1ff, &(0x7f00000001c0)=0x0) io_destroy(r6) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) io_submit(r5, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r7, &(0x7f0000000040), 0x65}]) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r8, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xe82b, r0, 0x0}]) 03:26:50 executing program 3 (fault-call:1 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:50 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) [ 300.595743][T10561] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 300.613320][T10560] FAULT_INJECTION: forcing a failure. [ 300.613320][T10560] name failslab, interval 1, probability 0, space 0, times 1 03:26:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 300.654379][T10562] FAULT_INJECTION: forcing a failure. [ 300.654379][T10562] name failslab, interval 1, probability 0, space 0, times 1 [ 300.702990][T10562] CPU: 0 PID: 10562 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 300.712931][T10562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.724297][T10562] Call Trace: [ 300.727772][T10562] dump_stack+0x188/0x20d [ 300.732240][T10562] should_fail.cold+0x5/0x14 [ 300.736925][T10562] ? lock_downgrade+0x7f0/0x7f0 [ 300.741865][T10562] ? setup_fault_attr+0x1e0/0x1e0 [ 300.746940][T10562] should_failslab+0x5/0xf 03:26:50 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) [ 300.751414][T10562] __kmalloc_track_caller+0x2d1/0x790 [ 300.756827][T10562] ? strndup_user+0x70/0xe0 [ 300.761382][T10562] ? vfs_write+0x15b/0x5c0 [ 300.765809][T10562] ? fput_many+0x2f/0x1a0 [ 300.770148][T10562] memdup_user+0x22/0xd0 [ 300.774402][T10562] strndup_user+0x70/0xe0 [ 300.778791][T10562] __x64_sys_mount+0xe6/0x230 [ 300.783498][T10562] do_syscall_64+0xf6/0x790 [ 300.788066][T10562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.793960][T10562] RIP: 0033:0x45c679 03:26:50 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) [ 300.797858][T10562] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.817470][T10562] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 300.825891][T10562] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 300.833875][T10562] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 300.841854][T10562] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 300.849825][T10562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 300.857800][T10562] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000000 [ 300.865809][T10560] CPU: 1 PID: 10560 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 300.876836][T10560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.886889][T10560] Call Trace: [ 300.890189][T10560] dump_stack+0x188/0x20d [ 300.894536][T10560] should_fail.cold+0x5/0x14 [ 300.899132][T10560] ? lock_downgrade+0x7f0/0x7f0 [ 300.904004][T10560] ? setup_fault_attr+0x1e0/0x1e0 [ 300.909072][T10560] should_failslab+0x5/0xf [ 300.913502][T10560] kmem_cache_alloc_node+0x25c/0x760 [ 300.918958][T10560] __alloc_skb+0xba/0x5a0 [ 300.923308][T10560] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 300.928930][T10560] ? netlink_autobind.isra.0+0x21b/0x300 [ 300.934578][T10560] netlink_sendmsg+0x97b/0xe10 [ 300.939400][T10560] ? aa_af_perm+0x260/0x260 [ 300.943923][T10560] ? netlink_unicast+0x740/0x740 [ 300.948885][T10560] ? netlink_unicast+0x740/0x740 [ 300.953840][T10560] sock_sendmsg+0xcf/0x120 [ 300.958269][T10560] ____sys_sendmsg+0x6b9/0x7d0 [ 300.963044][T10560] ? kernel_sendmsg+0x50/0x50 [ 300.967777][T10560] ___sys_sendmsg+0x100/0x170 [ 300.972477][T10560] ? sendmsg_copy_msghdr+0x70/0x70 [ 300.977618][T10560] ? __fget_files+0x329/0x4f0 [ 300.982316][T10560] ? do_dup2+0x520/0x520 [ 300.986586][T10560] ? __fget_light+0x208/0x270 [ 300.991285][T10560] __sys_sendmsg+0xec/0x1b0 [ 300.995805][T10560] ? __sys_sendmsg_sock+0xb0/0xb0 [ 301.000842][T10560] ? vfs_write+0x15b/0x5c0 [ 301.006908][T10560] ? trace_hardirqs_off_caller+0x55/0x230 [ 301.012658][T10560] ? do_syscall_64+0x21/0x790 [ 301.017351][T10560] do_syscall_64+0xf6/0x790 [ 301.021871][T10560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.027766][T10560] RIP: 0033:0x45c679 [ 301.031665][T10560] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:26:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 03:26:50 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 301.055790][T10560] RSP: 002b:00007f712348bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 301.064215][T10560] RAX: ffffffffffffffda RBX: 00007f712348c6d4 RCX: 000000000045c679 [ 301.072199][T10560] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 301.080177][T10560] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.088156][T10560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 301.096132][T10560] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000000 03:26:50 executing program 3 (fault-call:1 fault-nth:1): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) [ 301.155147][T10581] FAULT_INJECTION: forcing a failure. [ 301.155147][T10581] name failslab, interval 1, probability 0, space 0, times 0 [ 301.216627][T10581] CPU: 0 PID: 10581 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 301.226680][T10581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.237727][T10581] Call Trace: [ 301.241422][T10581] dump_stack+0x188/0x20d [ 301.245786][T10581] should_fail.cold+0x5/0x14 [ 301.250423][T10581] ? lock_downgrade+0x7f0/0x7f0 [ 301.255288][T10581] ? setup_fault_attr+0x1e0/0x1e0 [ 301.260338][T10581] should_failslab+0x5/0xf [ 301.264767][T10581] kmem_cache_alloc_node+0x25c/0x760 [ 301.270256][T10581] __alloc_skb+0xba/0x5a0 [ 301.274616][T10581] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 301.280177][T10581] ? netlink_autobind.isra.0+0x21b/0x300 [ 301.285830][T10581] netlink_sendmsg+0x97b/0xe10 [ 301.290625][T10581] ? aa_af_perm+0x260/0x260 [ 301.295229][T10581] ? netlink_unicast+0x740/0x740 [ 301.300191][T10581] ? netlink_unicast+0x740/0x740 [ 301.305140][T10581] sock_sendmsg+0xcf/0x120 [ 301.309653][T10581] ____sys_sendmsg+0x6b9/0x7d0 [ 301.314426][T10581] ? kernel_sendmsg+0x50/0x50 [ 301.319148][T10581] ___sys_sendmsg+0x100/0x170 [ 301.324474][T10581] ? sendmsg_copy_msghdr+0x70/0x70 [ 301.329224][T10586] FAULT_INJECTION: forcing a failure. [ 301.329224][T10586] name failslab, interval 1, probability 0, space 0, times 0 [ 301.330135][T10581] ? __fget_files+0x329/0x4f0 [ 301.330158][T10581] ? do_dup2+0x520/0x520 [ 301.351753][T10581] ? __fget_light+0x208/0x270 [ 301.356451][T10581] __sys_sendmsg+0xec/0x1b0 [ 301.360963][T10581] ? __sys_sendmsg_sock+0xb0/0xb0 [ 301.366007][T10581] ? vfs_write+0x15b/0x5c0 [ 301.370441][T10581] ? trace_hardirqs_off_caller+0x55/0x230 [ 301.376209][T10581] ? do_syscall_64+0x21/0x790 [ 301.380909][T10581] do_syscall_64+0xf6/0x790 [ 301.385435][T10581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.391879][T10581] RIP: 0033:0x45c679 [ 301.395778][T10581] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.416082][T10581] RSP: 002b:00007f9505c1cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 301.424516][T10581] RAX: ffffffffffffffda RBX: 00007f9505c1d6d4 RCX: 000000000045c679 [ 301.432483][T10581] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 301.440455][T10581] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.448430][T10581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 301.456396][T10581] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000000 [ 301.464414][T10586] CPU: 1 PID: 10586 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 301.474317][T10586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.485781][T10586] Call Trace: [ 301.489171][T10586] dump_stack+0x188/0x20d [ 301.493536][T10586] should_fail.cold+0x5/0x14 [ 301.498144][T10586] ? lock_downgrade+0x7f0/0x7f0 [ 301.503024][T10586] ? setup_fault_attr+0x1e0/0x1e0 [ 301.508077][T10586] should_failslab+0x5/0xf [ 301.512524][T10586] __kmalloc_track_caller+0x2d1/0x790 03:26:51 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 301.517900][T10586] ? strndup_user+0x70/0xe0 [ 301.522423][T10586] ? __might_fault+0x190/0x1d0 [ 301.527246][T10586] ? _copy_from_user+0x123/0x190 [ 301.532207][T10586] memdup_user+0x22/0xd0 [ 301.536457][T10586] strndup_user+0x70/0xe0 [ 301.540800][T10586] __x64_sys_mount+0x12f/0x230 [ 301.545581][T10586] do_syscall_64+0xf6/0x790 [ 301.550102][T10586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.555998][T10586] RIP: 0033:0x45c679 [ 301.559898][T10586] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.579511][T10586] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 301.587931][T10586] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 301.595903][T10586] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 301.603880][T10586] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.611862][T10586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 301.619832][T10586] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000001 [ 301.696343][T10593] FAULT_INJECTION: forcing a failure. [ 301.696343][T10593] name failslab, interval 1, probability 0, space 0, times 0 [ 301.710097][T10593] CPU: 1 PID: 10593 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 301.720000][T10593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.730081][T10593] Call Trace: [ 301.733380][T10593] dump_stack+0x188/0x20d [ 301.737742][T10593] should_fail.cold+0x5/0x14 [ 301.742358][T10593] ? lock_downgrade+0x7f0/0x7f0 [ 301.747223][T10593] ? setup_fault_attr+0x1e0/0x1e0 [ 301.752279][T10593] should_failslab+0x5/0xf [ 301.756701][T10593] kmem_cache_alloc_node_trace+0x27c/0x790 [ 301.762585][T10593] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 301.768596][T10593] __kmalloc_node_track_caller+0x38/0x60 [ 301.774251][T10593] __kmalloc_reserve.isra.0+0x39/0xe0 [ 301.779644][T10593] __alloc_skb+0xef/0x5a0 [ 301.783988][T10593] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 301.789550][T10593] ? netlink_autobind.isra.0+0x21b/0x300 [ 301.795204][T10593] netlink_sendmsg+0x97b/0xe10 [ 301.800000][T10593] ? aa_af_perm+0x260/0x260 [ 301.804523][T10593] ? netlink_unicast+0x740/0x740 [ 301.809485][T10593] ? netlink_unicast+0x740/0x740 [ 301.814440][T10593] sock_sendmsg+0xcf/0x120 [ 301.818871][T10593] ____sys_sendmsg+0x6b9/0x7d0 [ 301.823649][T10593] ? kernel_sendmsg+0x50/0x50 [ 301.828353][T10593] ___sys_sendmsg+0x100/0x170 [ 301.833039][T10593] ? sendmsg_copy_msghdr+0x70/0x70 [ 301.838173][T10593] ? __fget_files+0x329/0x4f0 [ 301.842866][T10593] ? do_dup2+0x520/0x520 [ 301.847128][T10593] ? __fget_light+0x208/0x270 [ 301.851823][T10593] __sys_sendmsg+0xec/0x1b0 [ 301.856340][T10593] ? __sys_sendmsg_sock+0xb0/0xb0 [ 301.861377][T10593] ? vfs_write+0x15b/0x5c0 [ 301.865870][T10593] ? trace_hardirqs_off_caller+0x55/0x230 [ 301.871602][T10593] ? do_syscall_64+0x21/0x790 [ 301.876296][T10593] do_syscall_64+0xf6/0x790 [ 301.880919][T10593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.886836][T10593] RIP: 0033:0x45c679 [ 301.890725][T10593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.910332][T10593] RSP: 002b:00007f712348bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 301.918741][T10593] RAX: ffffffffffffffda RBX: 00007f712348c6d4 RCX: 000000000045c679 [ 301.926701][T10593] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 301.934659][T10593] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.942663][T10593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 301.950626][T10593] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000001 03:26:52 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:52 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) 03:26:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:26:52 executing program 3 (fault-call:1 fault-nth:2): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:52 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000f00)=ANY=[@ANYBLOB="b80400001000010400"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x4b8}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000280)={{0x7, 0x7}, {0x2, 0x5d}, 0x7, 0x2, 0xf4}) ioctl$sock_inet_sctp_SIOCINQ(r5, 0x541b, &(0x7f0000000040)) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) [ 302.477945][T10603] FAULT_INJECTION: forcing a failure. [ 302.477945][T10603] name failslab, interval 1, probability 0, space 0, times 0 [ 302.478071][T10604] FAULT_INJECTION: forcing a failure. [ 302.478071][T10604] name failslab, interval 1, probability 0, space 0, times 0 [ 302.514297][T10607] FAULT_INJECTION: forcing a failure. [ 302.514297][T10607] name failslab, interval 1, probability 0, space 0, times 0 [ 302.539910][T10607] CPU: 0 PID: 10607 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 302.549828][T10607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.559885][T10607] Call Trace: [ 302.563215][T10607] dump_stack+0x188/0x20d [ 302.567565][T10607] should_fail.cold+0x5/0x14 [ 302.572193][T10607] ? lock_downgrade+0x7f0/0x7f0 [ 302.577057][T10607] ? setup_fault_attr+0x1e0/0x1e0 [ 302.582104][T10607] should_failslab+0x5/0xf [ 302.586546][T10607] kmem_cache_alloc+0x29b/0x730 [ 302.591401][T10607] ? find_held_lock+0x2d/0x110 [ 302.596257][T10607] getname_flags+0xd2/0x5b0 [ 302.600787][T10607] user_path_at_empty+0x2a/0x50 [ 302.605651][T10607] do_mount+0x132/0x1a60 [ 302.609907][T10607] ? copy_mount_string+0x40/0x40 [ 302.614858][T10607] ? __might_fault+0x190/0x1d0 [ 302.619622][T10607] ? _copy_from_user+0x123/0x190 [ 302.624566][T10607] ? memdup_user+0x7c/0xd0 [ 302.628993][T10607] __x64_sys_mount+0x18f/0x230 [ 302.633766][T10607] do_syscall_64+0xf6/0x790 [ 302.638277][T10607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.644169][T10607] RIP: 0033:0x45c679 [ 302.648070][T10607] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.667681][T10607] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 302.676099][T10607] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 03:26:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 302.684372][T10607] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 302.692364][T10607] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 302.700358][T10607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 302.708533][T10607] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000002 [ 302.723108][T10604] CPU: 1 PID: 10604 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 03:26:52 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000000000800020000000000", 0x24) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x78, &(0x7f0000000000)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x80, @remote, 0x5}, @in6={0xa, 0x4e24, 0x3f, @empty, 0x1}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in={0x2, 0x4e20, @rand_addr=0x8001}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x37}}]}, &(0x7f0000000240)=0x10) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000280)={r5, 0x3ff, 0x9, 0x4, 0x4, 0x9, 0x7, 0x40, {r7, @in6={{0xa, 0x4e21, 0x8, @mcast2}}, 0xa9, 0x6, 0x3, 0x5b1, 0x6}}, &(0x7f0000000340)=0xb0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f00000000c0)) [ 302.733066][T10604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.743143][T10604] Call Trace: [ 302.746457][T10604] dump_stack+0x188/0x20d [ 302.750810][T10604] should_fail.cold+0x5/0x14 [ 302.755420][T10604] ? lock_downgrade+0x7f0/0x7f0 [ 302.760290][T10604] ? setup_fault_attr+0x1e0/0x1e0 [ 302.765346][T10604] should_failslab+0x5/0xf [ 302.769769][T10604] kmem_cache_alloc_node_trace+0x27c/0x790 [ 302.775615][T10604] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 302.781624][T10604] __kmalloc_node_track_caller+0x38/0x60 [ 302.787275][T10604] __kmalloc_reserve.isra.0+0x39/0xe0 [ 302.792666][T10604] __alloc_skb+0xef/0x5a0 [ 302.797013][T10604] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 302.802575][T10604] ? netlink_autobind.isra.0+0x21b/0x300 [ 302.808226][T10604] netlink_sendmsg+0x97b/0xe10 [ 302.813013][T10604] ? aa_af_perm+0x260/0x260 [ 302.817528][T10604] ? netlink_unicast+0x740/0x740 [ 302.822496][T10604] ? netlink_unicast+0x740/0x740 [ 302.827447][T10604] sock_sendmsg+0xcf/0x120 [ 302.831870][T10604] ____sys_sendmsg+0x6b9/0x7d0 [ 302.836640][T10604] ? kernel_sendmsg+0x50/0x50 [ 302.841340][T10604] ___sys_sendmsg+0x100/0x170 [ 302.846019][T10604] ? sendmsg_copy_msghdr+0x70/0x70 [ 302.851147][T10604] ? __fget_files+0x329/0x4f0 [ 302.855832][T10604] ? do_dup2+0x520/0x520 [ 302.860088][T10604] ? __fget_light+0x208/0x270 [ 302.864784][T10604] __sys_sendmsg+0xec/0x1b0 [ 302.869291][T10604] ? __sys_sendmsg_sock+0xb0/0xb0 [ 302.874318][T10604] ? vfs_write+0x15b/0x5c0 [ 302.878751][T10604] ? trace_hardirqs_off_caller+0x55/0x230 [ 302.884477][T10604] ? do_syscall_64+0x21/0x790 [ 302.889169][T10604] do_syscall_64+0xf6/0x790 [ 302.893686][T10604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.899580][T10604] RIP: 0033:0x45c679 [ 302.903476][T10604] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.923090][T10604] RSP: 002b:00007f9505c1cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 302.931506][T10604] RAX: ffffffffffffffda RBX: 00007f9505c1d6d4 RCX: 000000000045c679 [ 302.939477][T10604] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 302.947457][T10604] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 302.955434][T10604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 302.963449][T10604] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000001 [ 302.971507][T10603] CPU: 0 PID: 10603 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 302.981412][T10603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.991466][T10603] Call Trace: [ 302.994768][T10603] dump_stack+0x188/0x20d [ 302.999112][T10603] should_fail.cold+0x5/0x14 [ 303.003712][T10603] ? setup_fault_attr+0x1e0/0x1e0 [ 303.008764][T10603] ? mark_held_locks+0xe0/0xe0 [ 303.013572][T10603] should_failslab+0x5/0xf [ 303.017997][T10603] kmem_cache_alloc+0x44/0x730 [ 303.022862][T10603] ? lock_acquire+0x197/0x420 [ 303.027571][T10603] skb_clone+0x14d/0x3c0 [ 303.031832][T10603] netlink_deliver_tap+0x91c/0xb50 [ 303.036969][T10603] netlink_unicast+0x5e9/0x740 [ 303.041751][T10603] ? netlink_attachskb+0x810/0x810 [ 303.046874][T10603] ? _copy_from_iter_full+0x25c/0x870 [ 303.052325][T10603] ? __phys_addr_symbol+0x2c/0x70 [ 303.057366][T10603] ? __check_object_size+0x171/0x437 [ 303.062676][T10603] netlink_sendmsg+0x882/0xe10 [ 303.067461][T10603] ? aa_af_perm+0x260/0x260 [ 303.071973][T10603] ? netlink_unicast+0x740/0x740 [ 303.076937][T10603] ? netlink_unicast+0x740/0x740 [ 303.081888][T10603] sock_sendmsg+0xcf/0x120 [ 303.086367][T10603] ____sys_sendmsg+0x6b9/0x7d0 [ 303.091152][T10603] ? kernel_sendmsg+0x50/0x50 [ 303.095866][T10603] ___sys_sendmsg+0x100/0x170 [ 303.100561][T10603] ? sendmsg_copy_msghdr+0x70/0x70 [ 303.105700][T10603] ? __fget_files+0x329/0x4f0 [ 303.110407][T10603] ? do_dup2+0x520/0x520 [ 303.114678][T10603] ? __fget_light+0x208/0x270 [ 303.119375][T10603] __sys_sendmsg+0xec/0x1b0 [ 303.123889][T10603] ? __sys_sendmsg_sock+0xb0/0xb0 [ 303.128921][T10603] ? vfs_write+0x15b/0x5c0 [ 303.133361][T10603] ? trace_hardirqs_off_caller+0x55/0x230 [ 303.139093][T10603] ? do_syscall_64+0x21/0x790 [ 303.143788][T10603] do_syscall_64+0xf6/0x790 [ 303.148305][T10603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.154200][T10603] RIP: 0033:0x45c679 [ 303.158117][T10603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.177759][T10603] RSP: 002b:00007f712348bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:26:52 executing program 3 (fault-call:1 fault-nth:3): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:52 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) 03:26:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x50}}, 0x0) 03:26:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x50}}, 0x0) [ 303.186251][T10603] RAX: ffffffffffffffda RBX: 00007f712348c6d4 RCX: 000000000045c679 [ 303.194224][T10603] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 303.202219][T10603] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.210189][T10603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 303.218177][T10603] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000002 [ 303.289897][T10626] FAULT_INJECTION: forcing a failure. [ 303.289897][T10626] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 303.303159][T10626] CPU: 0 PID: 10626 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 303.313071][T10626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.323134][T10626] Call Trace: [ 303.326436][T10626] dump_stack+0x188/0x20d [ 303.330786][T10626] should_fail.cold+0x5/0x14 [ 303.335396][T10626] ? setup_fault_attr+0x1e0/0x1e0 [ 303.340433][T10626] ? __lock_acquire+0x18c3/0x5270 [ 303.345578][T10626] __alloc_pages_nodemask+0x17a/0x820 [ 303.350971][T10626] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 303.356696][T10626] ? find_held_lock+0x2d/0x110 [ 303.361488][T10626] ? lock_downgrade+0x7f0/0x7f0 [ 303.366354][T10626] cache_grow_begin+0x8c/0xc10 [ 303.371132][T10626] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 303.376599][T10626] kmem_cache_alloc+0x66a/0x730 [ 303.381465][T10626] ? find_held_lock+0x2d/0x110 [ 303.386247][T10626] getname_flags+0xd2/0x5b0 [ 303.390777][T10626] user_path_at_empty+0x2a/0x50 [ 303.395642][T10626] do_mount+0x132/0x1a60 [ 303.400077][T10626] ? copy_mount_string+0x40/0x40 [ 303.405028][T10626] ? __might_fault+0x190/0x1d0 [ 303.409806][T10626] ? _copy_from_user+0x123/0x190 [ 303.414758][T10626] ? memdup_user+0x7c/0xd0 [ 303.419212][T10626] __x64_sys_mount+0x18f/0x230 [ 303.423997][T10626] do_syscall_64+0xf6/0x790 [ 303.428507][T10626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.434395][T10626] RIP: 0033:0x45c679 [ 303.438290][T10626] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.457909][T10626] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 303.466325][T10626] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 303.474300][T10626] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 303.482277][T10626] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 03:26:53 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}]}, 0x50}}, 0x0) [ 303.490249][T10626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 303.498222][T10626] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000003 [ 303.565360][T10636] FAULT_INJECTION: forcing a failure. [ 303.565360][T10636] name failslab, interval 1, probability 0, space 0, times 0 [ 303.590809][T10636] CPU: 0 PID: 10636 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 303.600734][T10636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.610783][T10636] Call Trace: [ 303.614093][T10636] dump_stack+0x188/0x20d [ 303.618445][T10636] should_fail.cold+0x5/0x14 [ 303.623058][T10636] ? setup_fault_attr+0x1e0/0x1e0 [ 303.628113][T10636] ? mark_held_locks+0xe0/0xe0 [ 303.632897][T10636] should_failslab+0x5/0xf [ 303.637322][T10636] kmem_cache_alloc+0x44/0x730 [ 303.642122][T10636] ? lock_acquire+0x197/0x420 [ 303.646814][T10636] skb_clone+0x14d/0x3c0 [ 303.651097][T10636] netlink_deliver_tap+0x91c/0xb50 [ 303.656233][T10636] netlink_unicast+0x5e9/0x740 [ 303.661020][T10636] ? netlink_attachskb+0x810/0x810 [ 303.666137][T10636] ? _copy_from_iter_full+0x25c/0x870 [ 303.671521][T10636] ? __phys_addr_symbol+0x2c/0x70 [ 303.676552][T10636] ? __check_object_size+0x171/0x437 [ 303.681851][T10636] netlink_sendmsg+0x882/0xe10 [ 303.686681][T10636] ? aa_af_perm+0x260/0x260 [ 303.691192][T10636] ? netlink_unicast+0x740/0x740 [ 303.696194][T10636] ? netlink_unicast+0x740/0x740 [ 303.701160][T10636] sock_sendmsg+0xcf/0x120 [ 303.705591][T10636] ____sys_sendmsg+0x6b9/0x7d0 [ 303.710371][T10636] ? kernel_sendmsg+0x50/0x50 [ 303.715082][T10636] ___sys_sendmsg+0x100/0x170 [ 303.719813][T10636] ? sendmsg_copy_msghdr+0x70/0x70 [ 303.724972][T10636] ? __fget_files+0x329/0x4f0 [ 303.729669][T10636] ? do_dup2+0x520/0x520 [ 303.733928][T10636] ? __fget_light+0x208/0x270 [ 303.738637][T10636] __sys_sendmsg+0xec/0x1b0 [ 303.743159][T10636] ? __sys_sendmsg_sock+0xb0/0xb0 [ 303.748193][T10636] ? vfs_write+0x15b/0x5c0 [ 303.752632][T10636] ? trace_hardirqs_off_caller+0x55/0x230 [ 303.758358][T10636] ? do_syscall_64+0x21/0x790 03:26:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x58}}, 0x0) 03:26:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x58}}, 0x0) [ 303.763055][T10636] do_syscall_64+0xf6/0x790 [ 303.767573][T10636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.773468][T10636] RIP: 0033:0x45c679 [ 303.777365][T10636] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.796974][T10636] RSP: 002b:00007f9505c1cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 303.805388][T10636] RAX: ffffffffffffffda RBX: 00007f9505c1d6d4 RCX: 000000000045c679 [ 303.813364][T10636] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 303.821339][T10636] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.829313][T10636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 303.837285][T10636] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000002 03:26:53 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000000000800020000000000", 0x24) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x78, &(0x7f0000000000)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x80, @remote, 0x5}, @in6={0xa, 0x4e24, 0x3f, @empty, 0x1}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in={0x2, 0x4e20, @rand_addr=0x8001}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x37}}]}, &(0x7f0000000240)=0x10) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000280)={r5, 0x3ff, 0x9, 0x4, 0x4, 0x9, 0x7, 0x40, {r7, @in6={{0xa, 0x4e21, 0x8, @mcast2}}, 0xa9, 0x6, 0x3, 0x5b1, 0x6}}, &(0x7f0000000340)=0xb0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f00000000c0)) 03:26:53 executing program 3 (fault-call:1 fault-nth:4): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) [ 304.086773][T10657] FAULT_INJECTION: forcing a failure. [ 304.086773][T10657] name failslab, interval 1, probability 0, space 0, times 0 03:26:53 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) 03:26:53 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x58}}, 0x0) 03:26:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 304.169030][T10657] CPU: 1 PID: 10657 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 304.178968][T10657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.189025][T10657] Call Trace: [ 304.192329][T10657] dump_stack+0x188/0x20d [ 304.196682][T10657] should_fail.cold+0x5/0x14 [ 304.201290][T10657] ? setup_fault_attr+0x1e0/0x1e0 [ 304.202592][T10666] FAULT_INJECTION: forcing a failure. [ 304.202592][T10666] name failslab, interval 1, probability 0, space 0, times 0 03:26:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 304.206334][T10657] should_failslab+0x5/0xf [ 304.206360][T10657] __kmalloc+0x2d9/0x7a0 [ 304.206383][T10657] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 304.233635][T10657] ? tomoyo_realpath_from_path+0xc2/0x620 [ 304.239362][T10657] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 304.244764][T10657] tomoyo_realpath_from_path+0xc2/0x620 [ 304.250320][T10657] ? tomoyo_fill_path_info+0x22e/0x420 [ 304.255829][T10657] tomoyo_mount_acl+0x149/0x840 [ 304.260688][T10657] ? find_held_lock+0x2d/0x110 [ 304.265470][T10657] ? mark_lock+0xbc/0x1220 [ 304.269925][T10657] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 304.275497][T10657] ? __lock_acquire+0x827/0x5270 [ 304.280490][T10657] ? lock_acquire+0x197/0x420 [ 304.285181][T10657] ? tomoyo_mount_permission+0xfa/0x3f0 [ 304.290741][T10657] tomoyo_mount_permission+0x151/0x3f0 [ 304.296207][T10657] ? tomoyo_mount_permission+0xfa/0x3f0 [ 304.301759][T10657] ? tomoyo_mount_acl+0x840/0x840 [ 304.306790][T10657] ? __phys_addr_symbol+0x2c/0x70 [ 304.311916][T10657] security_sb_mount+0x82/0xc0 [ 304.316703][T10657] do_mount+0x1b4/0x1a60 [ 304.322358][T10657] ? copy_mount_string+0x40/0x40 [ 304.327309][T10657] ? __might_fault+0x190/0x1d0 [ 304.332084][T10657] ? _copy_from_user+0x123/0x190 [ 304.337033][T10657] ? memdup_user+0x7c/0xd0 [ 304.341464][T10657] __x64_sys_mount+0x18f/0x230 [ 304.346248][T10657] do_syscall_64+0xf6/0x790 [ 304.350773][T10657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.356669][T10657] RIP: 0033:0x45c679 03:26:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xa, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 304.360565][T10657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.380172][T10657] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 304.388592][T10657] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 304.396564][T10657] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 304.404534][T10657] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 304.412503][T10657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 304.420474][T10657] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000004 [ 304.428485][T10666] CPU: 0 PID: 10666 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 304.438383][T10666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.448460][T10666] Call Trace: [ 304.451762][T10666] dump_stack+0x188/0x20d [ 304.456103][T10666] should_fail.cold+0x5/0x14 [ 304.460703][T10666] ? lock_downgrade+0x7f0/0x7f0 [ 304.465559][T10666] ? setup_fault_attr+0x1e0/0x1e0 [ 304.470609][T10666] should_failslab+0x5/0xf [ 304.475033][T10666] kmem_cache_alloc_node+0x25c/0x760 [ 304.480399][T10666] ? nfnetlink_bind+0x2b0/0x2b0 [ 304.485270][T10666] __alloc_skb+0xba/0x5a0 [ 304.489611][T10666] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 304.495158][T10666] ? consume_skb+0xfb/0x400 [ 304.499665][T10666] ? lock_downgrade+0x7f0/0x7f0 [ 304.504608][T10666] ? nlmon_xmit+0x9d/0xd0 [ 304.508956][T10666] netlink_ack+0x234/0xa80 [ 304.513428][T10666] ? __local_bh_enable_ip+0x159/0x270 [ 304.518808][T10666] ? netlink_sendmsg+0xe10/0xe10 [ 304.523774][T10666] ? __dev_queue_xmit+0xbf2/0x3070 [ 304.528905][T10666] netlink_rcv_skb+0x332/0x410 [ 304.533677][T10666] ? nfnetlink_bind+0x2b0/0x2b0 [ 304.538534][T10666] ? netlink_ack+0xa80/0xa80 [ 304.543156][T10666] ? ns_capable_common+0xe2/0x100 [ 304.548197][T10666] nfnetlink_rcv+0x1ac/0x420 [ 304.549037][T10657] ERROR: Out of memory at tomoyo_realpath_from_path. [ 304.552806][T10666] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 304.552850][T10666] netlink_unicast+0x537/0x740 [ 304.552874][T10666] ? netlink_attachskb+0x810/0x810 [ 304.552888][T10666] ? _copy_from_iter_full+0x25c/0x870 [ 304.552904][T10666] ? __phys_addr_symbol+0x2c/0x70 [ 304.552920][T10666] ? __check_object_size+0x171/0x437 [ 304.552942][T10666] netlink_sendmsg+0x882/0xe10 [ 304.552968][T10666] ? aa_af_perm+0x260/0x260 [ 304.599797][T10666] ? netlink_unicast+0x740/0x740 [ 304.604762][T10666] ? netlink_unicast+0x740/0x740 [ 304.609711][T10666] sock_sendmsg+0xcf/0x120 [ 304.614153][T10666] ____sys_sendmsg+0x6b9/0x7d0 [ 304.618931][T10666] ? kernel_sendmsg+0x50/0x50 [ 304.623643][T10666] ___sys_sendmsg+0x100/0x170 [ 304.628338][T10666] ? sendmsg_copy_msghdr+0x70/0x70 [ 304.633476][T10666] ? __fget_files+0x329/0x4f0 [ 304.638202][T10666] ? do_dup2+0x520/0x520 [ 304.642467][T10666] ? __fget_light+0x208/0x270 [ 304.647160][T10666] __sys_sendmsg+0xec/0x1b0 [ 304.651674][T10666] ? __sys_sendmsg_sock+0xb0/0xb0 [ 304.656708][T10666] ? vfs_write+0x15b/0x5c0 [ 304.661152][T10666] ? trace_hardirqs_off_caller+0x55/0x230 [ 304.666900][T10666] ? do_syscall_64+0x21/0x790 [ 304.671585][T10666] do_syscall_64+0xf6/0x790 [ 304.676099][T10666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.681994][T10666] RIP: 0033:0x45c679 [ 304.685888][T10666] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.705496][T10666] RSP: 002b:00007f9505c1cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:26:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:26:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:26:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:54 executing program 3 (fault-call:1 fault-nth:5): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) [ 304.713918][T10666] RAX: ffffffffffffffda RBX: 00007f9505c1d6d4 RCX: 000000000045c679 [ 304.721893][T10666] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 304.729870][T10666] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 304.737846][T10666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 304.745824][T10666] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000003 [ 304.928462][T10690] FAULT_INJECTION: forcing a failure. [ 304.928462][T10690] name failslab, interval 1, probability 0, space 0, times 0 [ 304.941776][T10690] CPU: 0 PID: 10690 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 304.951668][T10690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.961725][T10690] Call Trace: [ 304.965027][T10690] dump_stack+0x188/0x20d [ 304.969364][T10690] should_fail.cold+0x5/0x14 [ 304.973966][T10690] ? setup_fault_attr+0x1e0/0x1e0 [ 304.979018][T10690] should_failslab+0x5/0xf [ 304.983447][T10690] __kmalloc+0x2d9/0x7a0 [ 304.987701][T10690] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 304.993681][T10690] ? tomoyo_realpath_from_path+0xc2/0x620 [ 304.999413][T10690] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 305.004809][T10690] tomoyo_realpath_from_path+0xc2/0x620 [ 305.010371][T10690] ? tomoyo_fill_path_info+0x22e/0x420 [ 305.015860][T10690] tomoyo_mount_acl+0x149/0x840 [ 305.020720][T10690] ? find_held_lock+0x2d/0x110 [ 305.025499][T10690] ? mark_lock+0xbc/0x1220 [ 305.029930][T10690] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 305.035488][T10690] ? __lock_acquire+0x827/0x5270 [ 305.040489][T10690] ? lock_acquire+0x197/0x420 [ 305.045204][T10690] ? tomoyo_mount_permission+0xfa/0x3f0 [ 305.050776][T10690] tomoyo_mount_permission+0x151/0x3f0 [ 305.056259][T10690] ? tomoyo_mount_permission+0xfa/0x3f0 [ 305.061820][T10690] ? tomoyo_mount_acl+0x840/0x840 [ 305.066857][T10690] ? __phys_addr_symbol+0x2c/0x70 [ 305.071928][T10690] security_sb_mount+0x82/0xc0 [ 305.076708][T10690] do_mount+0x1b4/0x1a60 [ 305.080968][T10690] ? copy_mount_string+0x40/0x40 [ 305.085923][T10690] ? __might_fault+0x190/0x1d0 [ 305.090696][T10690] ? _copy_from_user+0x123/0x190 [ 305.095646][T10690] ? memdup_user+0x7c/0xd0 [ 305.100082][T10690] __x64_sys_mount+0x18f/0x230 [ 305.104862][T10690] do_syscall_64+0xf6/0x790 [ 305.109377][T10690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.115285][T10690] RIP: 0033:0x45c679 [ 305.119191][T10690] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.138798][T10690] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 305.147207][T10690] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 305.155173][T10690] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 305.163144][T10690] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.171114][T10690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 03:26:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r2) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, r2, 0xffffffffffffffff, r1, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB='security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00'/120], 0x78) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x39, 0xe, 0x13, 0x17, 0x7, 0x87e1, 0x4, 0x14f, 0xffffffffffffffff}) 03:26:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 305.179087][T10690] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000005 03:26:54 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) 03:26:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:26:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x60, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:54 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 305.291567][T10690] ERROR: Out of memory at tomoyo_realpath_from_path. 03:26:55 executing program 3 (fault-call:1 fault-nth:6): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x74, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x44, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) [ 305.483978][T10708] FAULT_INJECTION: forcing a failure. [ 305.483978][T10708] name failslab, interval 1, probability 0, space 0, times 0 [ 305.575498][T10708] CPU: 1 PID: 10708 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 305.585430][T10708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.595489][T10708] Call Trace: [ 305.598793][T10708] dump_stack+0x188/0x20d [ 305.603144][T10708] should_fail.cold+0x5/0x14 [ 305.607774][T10708] ? lock_downgrade+0x7f0/0x7f0 [ 305.612633][T10708] ? setup_fault_attr+0x1e0/0x1e0 [ 305.617678][T10708] should_failslab+0x5/0xf [ 305.622106][T10708] kmem_cache_alloc_node_trace+0x27c/0x790 [ 305.627931][T10708] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 305.633938][T10708] __kmalloc_node_track_caller+0x38/0x60 [ 305.639628][T10708] __kmalloc_reserve.isra.0+0x39/0xe0 [ 305.645037][T10708] __alloc_skb+0xef/0x5a0 [ 305.649386][T10708] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 305.654942][T10708] ? consume_skb+0xfb/0x400 [ 305.659458][T10708] ? lock_downgrade+0x7f0/0x7f0 [ 305.664325][T10708] ? nlmon_xmit+0x9d/0xd0 [ 305.668669][T10708] netlink_ack+0x234/0xa80 [ 305.670127][T10716] FAULT_INJECTION: forcing a failure. [ 305.670127][T10716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.673091][T10708] ? __local_bh_enable_ip+0x159/0x270 [ 305.691638][T10708] ? netlink_sendmsg+0xe10/0xe10 [ 305.696576][T10708] ? __dev_queue_xmit+0xbf2/0x3070 [ 305.701708][T10708] netlink_rcv_skb+0x332/0x410 [ 305.706485][T10708] ? nfnetlink_bind+0x2b0/0x2b0 [ 305.711344][T10708] ? netlink_ack+0xa80/0xa80 [ 305.715977][T10708] ? ns_capable_common+0xe2/0x100 [ 305.721020][T10708] nfnetlink_rcv+0x1ac/0x420 [ 305.725615][T10708] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 305.731103][T10708] netlink_unicast+0x537/0x740 [ 305.735885][T10708] ? netlink_attachskb+0x810/0x810 [ 305.740993][T10708] ? _copy_from_iter_full+0x25c/0x870 [ 305.746399][T10708] ? __phys_addr_symbol+0x2c/0x70 [ 305.751457][T10708] ? __check_object_size+0x171/0x437 [ 305.756767][T10708] netlink_sendmsg+0x882/0xe10 [ 305.761561][T10708] ? aa_af_perm+0x260/0x260 [ 305.766100][T10708] ? netlink_unicast+0x740/0x740 [ 305.771054][T10708] ? netlink_unicast+0x740/0x740 [ 305.775993][T10708] sock_sendmsg+0xcf/0x120 [ 305.780430][T10708] ____sys_sendmsg+0x6b9/0x7d0 [ 305.785205][T10708] ? kernel_sendmsg+0x50/0x50 [ 305.789906][T10708] ___sys_sendmsg+0x100/0x170 [ 305.794587][T10708] ? sendmsg_copy_msghdr+0x70/0x70 [ 305.799713][T10708] ? __fget_files+0x329/0x4f0 [ 305.804394][T10708] ? do_dup2+0x520/0x520 [ 305.808662][T10708] ? __fget_light+0x208/0x270 [ 305.813348][T10708] __sys_sendmsg+0xec/0x1b0 [ 305.817862][T10708] ? __sys_sendmsg_sock+0xb0/0xb0 [ 305.822906][T10708] ? vfs_write+0x15b/0x5c0 [ 305.827342][T10708] ? trace_hardirqs_off_caller+0x55/0x230 [ 305.833087][T10708] ? do_syscall_64+0x21/0x790 [ 305.837781][T10708] do_syscall_64+0xf6/0x790 [ 305.842300][T10708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.848196][T10708] RIP: 0033:0x45c679 [ 305.852089][T10708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.871698][T10708] RSP: 002b:00007f9505c1cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.880120][T10708] RAX: ffffffffffffffda RBX: 00007f9505c1d6d4 RCX: 000000000045c679 [ 305.888090][T10708] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 305.896057][T10708] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.904025][T10708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 305.911996][T10708] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000004 [ 305.920051][T10716] CPU: 0 PID: 10716 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 305.929945][T10716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.940009][T10716] Call Trace: [ 305.943314][T10716] dump_stack+0x188/0x20d [ 305.947664][T10716] should_fail.cold+0x5/0x14 [ 305.952264][T10716] ? __x64_sys_mount+0x18f/0x230 [ 305.957202][T10716] ? setup_fault_attr+0x1e0/0x1e0 [ 305.962226][T10716] ? lock_downgrade+0x7f0/0x7f0 [ 305.967079][T10716] ? lock_acquire+0x197/0x420 [ 305.971830][T10716] ? bpf_image_alloc+0x10/0x10 [ 305.976618][T10716] __alloc_pages_nodemask+0x17a/0x820 [ 305.982011][T10716] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 305.987766][T10716] cache_grow_begin+0x8c/0xc10 [ 305.992541][T10716] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 305.998017][T10716] __kmalloc+0x6d6/0x7a0 [ 306.002272][T10716] ? tomoyo_realpath_from_path+0xc2/0x620 [ 306.008016][T10716] tomoyo_realpath_from_path+0xc2/0x620 [ 306.013574][T10716] ? tomoyo_fill_path_info+0x22e/0x420 [ 306.019052][T10716] tomoyo_mount_acl+0x149/0x840 [ 306.023938][T10716] ? find_held_lock+0x2d/0x110 [ 306.028716][T10716] ? mark_lock+0xbc/0x1220 [ 306.033167][T10716] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 306.038726][T10716] ? __lock_acquire+0x827/0x5270 [ 306.043712][T10716] ? lock_acquire+0x197/0x420 [ 306.048446][T10716] ? tomoyo_mount_permission+0xfa/0x3f0 [ 306.054042][T10716] tomoyo_mount_permission+0x151/0x3f0 [ 306.059509][T10716] ? tomoyo_mount_permission+0xfa/0x3f0 [ 306.065066][T10716] ? tomoyo_mount_acl+0x840/0x840 [ 306.070101][T10716] ? __phys_addr_symbol+0x2c/0x70 [ 306.075162][T10716] security_sb_mount+0x82/0xc0 [ 306.079950][T10716] do_mount+0x1b4/0x1a60 [ 306.084209][T10716] ? copy_mount_string+0x40/0x40 [ 306.089160][T10716] ? __might_fault+0x190/0x1d0 [ 306.093941][T10716] ? _copy_from_user+0x123/0x190 [ 306.098889][T10716] ? memdup_user+0x7c/0xd0 [ 306.103328][T10716] __x64_sys_mount+0x18f/0x230 [ 306.108109][T10716] do_syscall_64+0xf6/0x790 [ 306.112642][T10716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.118538][T10716] RIP: 0033:0x45c679 [ 306.122438][T10716] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.142040][T10716] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 306.150456][T10716] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 306.158430][T10716] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 306.166398][T10716] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 03:26:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x44, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) 03:26:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x44, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) [ 306.174372][T10716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 306.182342][T10716] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000006 03:26:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)=0x1) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="bf770100000000004c001280080001006772650040000280080014007021000008000100", @ANYRES32, @ANYBLOB="0400120005000800fa00000008001500a64c000006001000000900000600030009000000050016000100000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="b06bfbadd04b8d3145b05ac750e6c2bf6ac0d00432f7a28b44a2e6e187eb8faa646f3f4e0d52ae38d2611f8248ebd2536b2cca6f4c78831b4350b210894fec03642de5dedcf1161cca06e8f424c7abcaf08b2fb8a80c8c99d0ddd3ad2c872f4e04de34ee9d33da43897b078b318d698a76a6ac6cf0c139f6f7981ce4652a551a9ef17eb067312007bd2f9afe4ed1b53e5b4c2f7444d9445401006dfc"], 0x7c}}, 0x0) 03:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:26:56 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:56 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) 03:26:56 executing program 3 (fault-call:1 fault-nth:7): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) [ 306.425666][T10734] FAULT_INJECTION: forcing a failure. [ 306.425666][T10734] name failslab, interval 1, probability 0, space 0, times 0 03:26:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 306.495711][T10734] CPU: 0 PID: 10734 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 306.505655][T10734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.515722][T10734] Call Trace: [ 306.518083][T10743] device gre1 entered promiscuous mode [ 306.519030][T10734] dump_stack+0x188/0x20d [ 306.519059][T10734] should_fail.cold+0x5/0x14 [ 306.519080][T10734] ? setup_fault_attr+0x1e0/0x1e0 [ 306.519105][T10734] ? mark_held_locks+0xe0/0xe0 [ 306.535414][T10745] FAULT_INJECTION: forcing a failure. [ 306.535414][T10745] name failslab, interval 1, probability 0, space 0, times 0 [ 306.538478][T10734] should_failslab+0x5/0xf [ 306.538495][T10734] kmem_cache_alloc+0x44/0x730 [ 306.538518][T10734] ? lock_acquire+0x197/0x420 [ 306.538540][T10734] skb_clone+0x14d/0x3c0 [ 306.538570][T10734] netlink_deliver_tap+0x91c/0xb50 [ 306.579038][T10734] __netlink_sendskb+0x5b/0xb0 [ 306.583817][T10734] netlink_unicast+0x651/0x740 [ 306.588595][T10734] ? netlink_attachskb+0x810/0x810 03:26:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xe00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 306.593708][T10734] ? skb_put+0x15d/0x1c0 [ 306.597957][T10734] ? memset+0x20/0x40 [ 306.602033][T10734] ? __nlmsg_put+0x14b/0x1b0 [ 306.606643][T10734] netlink_ack+0x5a2/0xa80 [ 306.611071][T10734] ? __local_bh_enable_ip+0x159/0x270 [ 306.616480][T10734] ? netlink_sendmsg+0xe10/0xe10 [ 306.621426][T10734] ? __dev_queue_xmit+0xbf2/0x3070 [ 306.626558][T10734] netlink_rcv_skb+0x332/0x410 [ 306.631337][T10734] ? nfnetlink_bind+0x2b0/0x2b0 [ 306.636197][T10734] ? netlink_ack+0xa80/0xa80 [ 306.640813][T10734] ? ns_capable_common+0xe2/0x100 [ 306.645867][T10734] nfnetlink_rcv+0x1ac/0x420 [ 306.650490][T10734] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 306.655977][T10734] netlink_unicast+0x537/0x740 [ 306.660766][T10734] ? netlink_attachskb+0x810/0x810 [ 306.666090][T10734] ? _copy_from_iter_full+0x25c/0x870 [ 306.671468][T10734] ? __phys_addr_symbol+0x2c/0x70 [ 306.676499][T10734] ? __check_object_size+0x171/0x437 [ 306.681793][T10734] netlink_sendmsg+0x882/0xe10 [ 306.686575][T10734] ? aa_af_perm+0x260/0x260 [ 306.691088][T10734] ? netlink_unicast+0x740/0x740 03:26:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 306.696055][T10734] ? netlink_unicast+0x740/0x740 [ 306.701003][T10734] sock_sendmsg+0xcf/0x120 [ 306.705441][T10734] ____sys_sendmsg+0x6b9/0x7d0 [ 306.710222][T10734] ? kernel_sendmsg+0x50/0x50 [ 306.714927][T10734] ___sys_sendmsg+0x100/0x170 [ 306.719619][T10734] ? sendmsg_copy_msghdr+0x70/0x70 [ 306.724775][T10734] ? __fget_files+0x329/0x4f0 [ 306.729464][T10734] ? do_dup2+0x520/0x520 [ 306.733727][T10734] ? __fget_light+0x208/0x270 [ 306.738432][T10734] __sys_sendmsg+0xec/0x1b0 [ 306.742947][T10734] ? __sys_sendmsg_sock+0xb0/0xb0 [ 306.747982][T10734] ? vfs_write+0x15b/0x5c0 [ 306.752419][T10734] ? trace_hardirqs_off_caller+0x55/0x230 [ 306.758149][T10734] ? do_syscall_64+0x21/0x790 [ 306.762838][T10734] do_syscall_64+0xf6/0x790 [ 306.767352][T10734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.773244][T10734] RIP: 0033:0x45c679 [ 306.777145][T10734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:26:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 306.796777][T10734] RSP: 002b:00007f9505c1cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 306.805195][T10734] RAX: ffffffffffffffda RBX: 00007f9505c1d6d4 RCX: 000000000045c679 [ 306.813161][T10734] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 306.821130][T10734] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 306.829103][T10734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 306.837072][T10734] R13: 0000000000000922 R14: 00000000004cba2b R15: 0000000000000005 [ 306.845077][T10745] CPU: 1 PID: 10745 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 306.854989][T10745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.865044][T10745] Call Trace: [ 306.868345][T10745] dump_stack+0x188/0x20d [ 306.872701][T10745] should_fail.cold+0x5/0x14 [ 306.877299][T10745] ? setup_fault_attr+0x1e0/0x1e0 [ 306.882349][T10745] should_failslab+0x5/0xf [ 306.886772][T10745] __kmalloc+0x2d9/0x7a0 [ 306.891022][T10745] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 306.896405][T10745] ? lock_acquire+0x197/0x420 [ 306.901097][T10745] ? __get_fs_type+0x1d/0xc0 [ 306.905716][T10745] tomoyo_encode2.part.0+0xec/0x3b0 [ 306.910931][T10745] tomoyo_encode+0x28/0x50 [ 306.915362][T10745] tomoyo_mount_acl+0x320/0x840 [ 306.920218][T10745] ? find_held_lock+0x2d/0x110 [ 306.924998][T10745] ? mark_lock+0xbc/0x1220 [ 306.929438][T10745] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 306.935003][T10745] ? __lock_acquire+0x827/0x5270 [ 306.939996][T10745] ? lock_acquire+0x197/0x420 [ 306.944682][T10745] ? tomoyo_mount_permission+0xfa/0x3f0 [ 306.950248][T10745] tomoyo_mount_permission+0x151/0x3f0 [ 306.955721][T10745] ? tomoyo_mount_permission+0xfa/0x3f0 [ 306.961272][T10745] ? tomoyo_mount_acl+0x840/0x840 [ 306.966302][T10745] ? __phys_addr_symbol+0x2c/0x70 [ 306.971362][T10745] security_sb_mount+0x82/0xc0 [ 306.976151][T10745] do_mount+0x1b4/0x1a60 [ 306.980418][T10745] ? copy_mount_string+0x40/0x40 [ 306.985363][T10745] ? __might_fault+0x190/0x1d0 [ 306.990139][T10745] ? _copy_from_user+0x123/0x190 [ 306.995091][T10745] ? memdup_user+0x7c/0xd0 [ 306.999532][T10745] __x64_sys_mount+0x18f/0x230 [ 307.004310][T10745] do_syscall_64+0xf6/0x790 [ 307.008832][T10745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.014730][T10745] RIP: 0033:0x45c679 [ 307.018631][T10745] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.038237][T10745] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:26:56 executing program 2 (fault-call:1 fault-nth:6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 307.046657][T10745] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 307.054652][T10745] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 307.062635][T10745] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 307.070623][T10745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 307.079110][T10745] R13: 000000000000074a R14: 00000000004c9f51 R15: 0000000000000007 03:26:57 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c001600ff6929ab00006756237ca89602c63125bccf4af0a5991b2770feb93c51c0999a281b55f142f2a59c0d00"/61], 0x1}}, 0x840) r0 = socket(0x22, 0x2, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000280)={0x2, 0x0, [{0xb68, 0x0, 0x800}, {0x669}]}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r5, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xfdc}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xe}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xf}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x2000000}, 0x20068004) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 03:26:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:57 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) 03:26:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:26:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:26:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x4c, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 03:26:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x7400, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x2, 0x0) 03:26:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect(0xffffffffffffffff, &(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x1ac8, @mcast2, 0xc06}}, 0x80) prctl$PR_MCE_KILL_GET(0x22) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1f, 0x400) 03:26:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x4c, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 03:26:57 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x3, 0x0) 03:26:58 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) 03:26:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x4c, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 03:26:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4, 0x0) 03:26:58 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x6}) listen(r0, 0x20000003) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x101, 0x6, 0x9, 0x8, 0x42, 0x8, 0x4}, &(0x7f0000000100)=0x9c) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e20, 0x3, @mcast2, 0xfffffffb}}}, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) setsockopt$bt_hci_HCI_TIME_STAMP(r6, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r6, 0x551f) accept4$ax25(r6, 0x0, &(0x7f0000000200), 0x80000) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="10004000006e2200"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "95cfb8c57ebde371503a38bd8e3f6ba990189977170a070502000000269a0b966b9b9d3289c8784f16963ce7c312649ce2996cd4d2fb7a95ff986185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e6265300"}, 0x80) 03:26:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:58 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x5, 0x0) 03:26:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x4c, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 03:26:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf0ffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xa, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:26:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6, 0x0) 03:26:59 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x6}) listen(r0, 0x20000003) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x101, 0x6, 0x9, 0x8, 0x42, 0x8, 0x4}, &(0x7f0000000100)=0x9c) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e20, 0x3, @mcast2, 0xfffffffb}}}, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) setsockopt$bt_hci_HCI_TIME_STAMP(r6, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r6, 0x551f) accept4$ax25(r6, 0x0, &(0x7f0000000200), 0x80000) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="10004000006e2200"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "95cfb8c57ebde371503a38bd8e3f6ba990189977170a070502000000269a0b966b9b9d3289c8784f16963ce7c312649ce2996cd4d2fb7a95ff986185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e6265300"}, 0x80) 03:26:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x4c, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 03:26:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xe, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7, 0x0) 03:26:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x4c, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 03:26:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x60, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:26:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:26:59 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x8, 0x0) 03:26:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x44, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x44}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x4c, r3, 0x10, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x40}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000880}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') r6 = socket$inet6(0x11, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f0000000140)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000005000000100000008000100", @ANYRES32=r7, @ANYBLOB="06000600224e0000"], 0x24}}, 0x0) 03:26:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x72, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:26:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:27:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x9, 0x0) [ 310.316848][T10900] wireguard: wg2: Could not create IPv4 socket 03:27:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 310.406030][T10908] wireguard: wg2: Could not create IPv4 socket 03:27:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000a0000000001004d010000000000000000007a000000000001f6f2a2299748ae8927a6f2b10efd9a000001", 0x33, 0x10000}], 0xa51746f5306d3390, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000240)={0x1, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0]}) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$USERIO_CMD_REGISTER(r1, &(0x7f00000002c0), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000000)={0x2, 0xfc}, 0x2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x400, 0x0) openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000400)='./file0\x00', 0xa0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000440)={"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"}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000300)=""/234) 03:27:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 310.835308][T10933] misc userio: The device must be registered before sending interrupts 03:27:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xe000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:00 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xa, 0x0) 03:27:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 03:27:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xe00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x10, 0x0) 03:27:01 executing program 1 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:01 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(r0, 0x1269, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0xfd}, {&(0x7f0000000100)="d10bcee1e29d4128327c2cb1bd1df1e9bbfb67aa05e818d49e70b86048cf023eb73b3af76b96b29f2637f8064cf8c7b846", 0x31}, {&(0x7f0000000900)="345c2d8464d48dbe1db4ec986cf95cb03f41a44dfbabe12014ed2e94adaefd4ac9ce7a66fa2ca9a0ec6aa8d43a4664839a6d491b7eb05c4fcc319d152e6c4a15faff7e62a8e70dc01dfd2cad7c4076640298660cac28e6120ee3be5d6a4bc89a84bf1f4fe1648ebb65117c71a567950eebb384cdad5a0c659f1a73c36b9cd4ec918859b1a1c3f58b8d72591bf8ca7b353101d8c0f9fb5dfde7a88c3da8f2640a035d27600aefcac52dbddc6e9ec705e6f4ea30fb154104518c7064872fbfcc5eeafb78e09c980cdafd6d6233df114d", 0xcf}], 0x3, 0xd) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="580000000206e7180000000000000000000000000c00078008001240000000000900020073797a31000000000500010007000000120f0300686173683a6e65742c706f727400000005000400000000000500050002040000"], 0x58}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0xc) process_vm_readv(r2, &(0x7f0000000640)=[{&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f00000001c0)=""/34, 0x22}, {&(0x7f0000000a00)=""/222, 0xde}, {&(0x7f0000000b00)=""/192, 0xc0}, {&(0x7f0000000580)=""/89, 0x59}], 0x6, &(0x7f0000000300)=[{&(0x7f0000000bc0)=""/174, 0xae}], 0x1, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = socket$isdn(0x22, 0x3, 0x25) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000040)) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x100000000000000, &(0x7f0000000340), 0x106}}, 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) socket$inet6(0xa, 0x40000080806, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 311.478443][T10966] FAULT_INJECTION: forcing a failure. [ 311.478443][T10966] name failslab, interval 1, probability 0, space 0, times 0 03:27:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 311.540483][T10968] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 311.560893][T10966] CPU: 1 PID: 10966 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 311.570806][T10966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.580860][T10966] Call Trace: [ 311.584162][T10966] dump_stack+0x188/0x20d [ 311.588524][T10966] should_fail.cold+0x5/0x14 [ 311.593127][T10966] ? lock_downgrade+0x7f0/0x7f0 [ 311.597988][T10966] ? setup_fault_attr+0x1e0/0x1e0 [ 311.603034][T10966] should_failslab+0x5/0xf [ 311.607457][T10966] kmem_cache_alloc_node+0x25c/0x760 [ 311.612765][T10966] __alloc_skb+0xba/0x5a0 [ 311.617105][T10966] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 311.622662][T10966] ? netlink_autobind.isra.0+0x21b/0x300 [ 311.628311][T10966] netlink_sendmsg+0x97b/0xe10 [ 311.633096][T10966] ? aa_af_perm+0x260/0x260 [ 311.637607][T10966] ? netlink_unicast+0x740/0x740 [ 311.642569][T10966] ? netlink_unicast+0x740/0x740 [ 311.647518][T10966] sock_sendmsg+0xcf/0x120 [ 311.651952][T10966] ____sys_sendmsg+0x6b9/0x7d0 [ 311.656729][T10966] ? kernel_sendmsg+0x50/0x50 [ 311.661435][T10966] ___sys_sendmsg+0x100/0x170 [ 311.666115][T10966] ? sendmsg_copy_msghdr+0x70/0x70 [ 311.671246][T10966] ? __fget_files+0x329/0x4f0 [ 311.675947][T10966] ? do_dup2+0x520/0x520 [ 311.680212][T10966] ? __fget_light+0x208/0x270 [ 311.684914][T10966] __sys_sendmsg+0xec/0x1b0 [ 311.689423][T10966] ? __sys_sendmsg_sock+0xb0/0xb0 [ 311.694455][T10966] ? vfs_write+0x15b/0x5c0 [ 311.698892][T10966] ? trace_hardirqs_off_caller+0x55/0x230 [ 311.704627][T10966] ? do_syscall_64+0x21/0x790 [ 311.709315][T10966] do_syscall_64+0xf6/0x790 [ 311.713827][T10966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.719721][T10966] RIP: 0033:0x45c679 [ 311.723622][T10966] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.743225][T10966] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 311.751636][T10966] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 311.759609][T10966] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 311.767583][T10966] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 311.775555][T10966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 311.783530][T10966] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000000 03:27:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x48, 0x0) 03:27:01 executing program 1 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x3f00, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:01 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4c, 0x0) 03:27:01 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(r0, 0x1269, 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0xfd}, {&(0x7f0000000100)="d10bcee1e29d4128327c2cb1bd1df1e9bbfb67aa05e818d49e70b86048cf023eb73b3af76b96b29f2637f8064cf8c7b846", 0x31}, {&(0x7f0000000900)="345c2d8464d48dbe1db4ec986cf95cb03f41a44dfbabe12014ed2e94adaefd4ac9ce7a66fa2ca9a0ec6aa8d43a4664839a6d491b7eb05c4fcc319d152e6c4a15faff7e62a8e70dc01dfd2cad7c4076640298660cac28e6120ee3be5d6a4bc89a84bf1f4fe1648ebb65117c71a567950eebb384cdad5a0c659f1a73c36b9cd4ec918859b1a1c3f58b8d72591bf8ca7b353101d8c0f9fb5dfde7a88c3da8f2640a035d27600aefcac52dbddc6e9ec705e6f4ea30fb154104518c7064872fbfcc5eeafb78e09c980cdafd6d6233df114d", 0xcf}], 0x3, 0xd) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="580000000206e7180000000000000000000000000c00078008001240000000000900020073797a31000000000500010007000000120f0300686173683a6e65742c706f727400000005000400000000000500050002040000"], 0x58}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0xc) process_vm_readv(r2, &(0x7f0000000640)=[{&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f00000001c0)=""/34, 0x22}, {&(0x7f0000000a00)=""/222, 0xde}, {&(0x7f0000000b00)=""/192, 0xc0}, {&(0x7f0000000580)=""/89, 0x59}], 0x6, &(0x7f0000000300)=[{&(0x7f0000000bc0)=""/174, 0xae}], 0x1, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = socket$isdn(0x22, 0x3, 0x25) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000040)) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x100000000000000, &(0x7f0000000340), 0x106}}, 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) socket$inet6(0xa, 0x40000080806, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 312.108011][T10996] FAULT_INJECTION: forcing a failure. [ 312.108011][T10996] name failslab, interval 1, probability 0, space 0, times 0 [ 312.211709][T10996] CPU: 0 PID: 10996 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 312.221645][T10996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.231732][T10996] Call Trace: [ 312.235044][T10996] dump_stack+0x188/0x20d [ 312.239392][T10996] should_fail.cold+0x5/0x14 [ 312.243993][T10996] ? lock_downgrade+0x7f0/0x7f0 [ 312.248852][T10996] ? setup_fault_attr+0x1e0/0x1e0 [ 312.253918][T10996] should_failslab+0x5/0xf [ 312.258343][T10996] kmem_cache_alloc_node_trace+0x27c/0x790 [ 312.264153][T10996] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 312.270149][T10996] __kmalloc_node_track_caller+0x38/0x60 [ 312.275794][T10996] __kmalloc_reserve.isra.0+0x39/0xe0 [ 312.281177][T10996] __alloc_skb+0xef/0x5a0 [ 312.285518][T10996] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 312.291076][T10996] ? netlink_autobind.isra.0+0x21b/0x300 [ 312.296721][T10996] netlink_sendmsg+0x97b/0xe10 [ 312.301500][T10996] ? aa_af_perm+0x260/0x260 [ 312.306009][T10996] ? netlink_unicast+0x740/0x740 [ 312.310965][T10996] ? netlink_unicast+0x740/0x740 [ 312.315912][T10996] sock_sendmsg+0xcf/0x120 [ 312.320338][T10996] ____sys_sendmsg+0x6b9/0x7d0 [ 312.325113][T10996] ? kernel_sendmsg+0x50/0x50 [ 312.329820][T10996] ___sys_sendmsg+0x100/0x170 [ 312.334513][T10996] ? sendmsg_copy_msghdr+0x70/0x70 [ 312.339657][T10996] ? __fget_files+0x329/0x4f0 [ 312.344353][T10996] ? do_dup2+0x520/0x520 [ 312.348626][T10996] ? __fget_light+0x208/0x270 [ 312.353322][T10996] __sys_sendmsg+0xec/0x1b0 [ 312.357825][T10996] ? __sys_sendmsg_sock+0xb0/0xb0 [ 312.362852][T10996] ? vfs_write+0x15b/0x5c0 [ 312.367290][T10996] ? trace_hardirqs_off_caller+0x55/0x230 [ 312.373017][T10996] ? do_syscall_64+0x21/0x790 [ 312.377706][T10996] do_syscall_64+0xf6/0x790 [ 312.382229][T10996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.388130][T10996] RIP: 0033:0x45c679 [ 312.392031][T10996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:27:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x68, 0x0) 03:27:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6c, 0x0) [ 312.411633][T10996] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 312.420050][T10996] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 312.428038][T10996] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 312.436014][T10996] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 312.443985][T10996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 312.451959][T10996] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000001 03:27:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x74000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 312.531638][T11020] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 03:27:02 executing program 1 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x7200, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x74, 0x0) 03:27:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7a, 0x0) 03:27:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0xfb, 0x9a, 0x3, 0x8, 0x0, 0x2, 0xc049, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff74af, 0x2, @perf_bp={&(0x7f0000000480), 0x5}, 0x0, 0x9, 0x2, 0x7, 0xb126, 0x0, 0xfff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0xb4, 0x0, 0x285, 0x8001}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a40)=ANY=[@ANYBLOB="00a18255f288afabbf191be3565ba1692572e903338efa2d0616342342ec86f4c8a403ad3b3da1a3347986ac34c82ad2b4f4139958a9b714bbbf96a574c6edbdf616d4e9d8162a9e5ade4a06e160497063a14ff869b2de51830aa832ae8ea67392badb7e3702ca3b4d8fff591c48dfeed1f824c3561fb8cd8704ecb659fb0307000000000000009c57084f3e5ae8120ae1ddeaa48bd13edc5ecebbcb38fa44b9bc7d47430276d0a0463c191196eccf301a8c7ea2539e45943207bfcada5e520df2cbd16184e74d274262e44eb81ddf4c8deac424188dd57d3c0457f0cf859639a9d9d39e1059c1bda237b147c1031ae00000"], 0xf2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket$kcm(0x29, 0xa, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) setsockopt$bt_hci_HCI_TIME_STAMP(r7, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r7, 0x551f) accept4$tipc(r7, &(0x7f0000000300)=@id, &(0x7f0000000340)=0x10, 0x80800) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) getsockopt$sock_buf(r8, 0x1, 0x1f, &(0x7f0000000200)=""/223, &(0x7f0000000100)=0xdf) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000040)={0x9d0000, 0xfffffffb, 0xfffffe00, r5, 0x0, &(0x7f0000000000)={0x9909d3, 0xfffff5c9, [], @ptr=0x5}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 03:27:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 312.992635][T11048] FAULT_INJECTION: forcing a failure. [ 312.992635][T11048] name failslab, interval 1, probability 0, space 0, times 0 [ 313.070209][T11048] CPU: 1 PID: 11048 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 313.080138][T11048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.090192][T11048] Call Trace: [ 313.093495][T11048] dump_stack+0x188/0x20d [ 313.097848][T11048] should_fail.cold+0x5/0x14 [ 313.102462][T11048] ? setup_fault_attr+0x1e0/0x1e0 [ 313.107507][T11048] ? mark_held_locks+0xe0/0xe0 [ 313.112289][T11048] should_failslab+0x5/0xf [ 313.116716][T11048] kmem_cache_alloc+0x44/0x730 [ 313.121491][T11048] ? lock_acquire+0x197/0x420 [ 313.126185][T11048] skb_clone+0x14d/0x3c0 [ 313.130440][T11048] netlink_deliver_tap+0x91c/0xb50 [ 313.135567][T11048] netlink_unicast+0x5e9/0x740 [ 313.140345][T11048] ? netlink_attachskb+0x810/0x810 [ 313.145460][T11048] ? _copy_from_iter_full+0x25c/0x870 [ 313.150835][T11048] ? __phys_addr_symbol+0x2c/0x70 [ 313.155867][T11048] ? __check_object_size+0x171/0x437 [ 313.161162][T11048] netlink_sendmsg+0x882/0xe10 [ 313.165938][T11048] ? aa_af_perm+0x260/0x260 [ 313.170448][T11048] ? netlink_unicast+0x740/0x740 [ 313.175407][T11048] ? netlink_unicast+0x740/0x740 [ 313.180355][T11048] sock_sendmsg+0xcf/0x120 [ 313.184779][T11048] ____sys_sendmsg+0x6b9/0x7d0 [ 313.189555][T11048] ? kernel_sendmsg+0x50/0x50 [ 313.194264][T11048] ___sys_sendmsg+0x100/0x170 [ 313.198950][T11048] ? sendmsg_copy_msghdr+0x70/0x70 [ 313.204083][T11048] ? __fget_files+0x329/0x4f0 [ 313.208779][T11048] ? do_dup2+0x520/0x520 [ 313.213050][T11048] ? __fget_light+0x208/0x270 03:27:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf5ffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:02 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf0, 0x0) [ 313.217744][T11048] __sys_sendmsg+0xec/0x1b0 [ 313.222255][T11048] ? __sys_sendmsg_sock+0xb0/0xb0 [ 313.227290][T11048] ? vfs_write+0x15b/0x5c0 [ 313.231746][T11048] ? trace_hardirqs_off_caller+0x55/0x230 [ 313.237479][T11048] ? do_syscall_64+0x21/0x790 [ 313.242168][T11048] do_syscall_64+0xf6/0x790 [ 313.246696][T11048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.252583][T11048] RIP: 0033:0x45c679 [ 313.256481][T11048] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.276084][T11048] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 313.284499][T11048] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 313.292469][T11048] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 313.300447][T11048] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 313.308417][T11048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 313.316387][T11048] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000002 03:27:03 executing program 1 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfcffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x300, 0x0) 03:27:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:03 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4880c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x3) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001b00)=ANY=[@ANYBLOB="480000001000050700b000000000000000000000fbeee684bb81c610416860a34fe258fa2c473841730ae81b8c3ad7d7e46e8e57b392e604a874488a1ca2479a7a02cb29b33bf6663cceda159a46fdfc660fa3198fda0f28ce9e246e92f029f1533dd1b1a8a0b8d7940d30bd2c8cf487d802b43f1638e22e72a0176ee5141554ed396d8c8deab5a672edcfac9f20fe2c317683cde40f46bc4abe80dadb189abfdde923d3fc4f5a032343d2d93824d3eb8a783b723a75cbec36b4901c812a0f", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000300), 0x12) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x0, 0x1}, 0x3c) 03:27:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x500, 0x0) [ 313.626029][T11086] FAULT_INJECTION: forcing a failure. [ 313.626029][T11086] name failslab, interval 1, probability 0, space 0, times 0 [ 313.689992][T11086] CPU: 0 PID: 11086 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 313.699928][T11086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.709984][T11086] Call Trace: [ 313.713285][T11086] dump_stack+0x188/0x20d [ 313.717638][T11086] should_fail.cold+0x5/0x14 [ 313.722250][T11086] ? setup_fault_attr+0x1e0/0x1e0 [ 313.727300][T11086] should_failslab+0x5/0xf [ 313.731729][T11086] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 313.737118][T11086] ? rcu_read_lock_held_common+0x130/0x130 [ 313.743082][T11086] ip_set_create+0x45e/0x13c0 [ 313.747790][T11086] ? ip_set_destroy+0xb00/0xb00 [ 313.752686][T11086] ? nla_memcpy+0xa0/0xa0 [ 313.757033][T11086] ? ip_set_destroy+0xb00/0xb00 [ 313.761898][T11086] nfnetlink_rcv_msg+0xc83/0xf30 [ 313.766870][T11086] ? nfnetlink_bind+0x2b0/0x2b0 [ 313.771751][T11086] ? consume_skb+0xfb/0x400 [ 313.776705][T11086] ? lock_downgrade+0x7f0/0x7f0 [ 313.781566][T11086] ? nlmon_xmit+0x9d/0xd0 [ 313.785915][T11086] ? __local_bh_enable_ip+0x159/0x270 [ 313.791377][T11086] ? lockdep_hardirqs_on+0x417/0x5d0 [ 313.796680][T11086] ? __dev_queue_xmit+0x174a/0x3070 [ 313.801886][T11086] ? __local_bh_enable_ip+0x159/0x270 [ 313.807279][T11086] ? __dev_queue_xmit+0xbf2/0x3070 [ 313.812441][T11086] netlink_rcv_skb+0x15a/0x410 [ 313.817228][T11086] ? nfnetlink_bind+0x2b0/0x2b0 [ 313.822091][T11086] ? netlink_ack+0xa80/0xa80 [ 313.826706][T11086] ? ns_capable_common+0xe2/0x100 [ 313.831746][T11086] nfnetlink_rcv+0x1ac/0x420 [ 313.836345][T11086] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 313.841826][T11086] netlink_unicast+0x537/0x740 [ 313.846605][T11086] ? netlink_attachskb+0x810/0x810 [ 313.851725][T11086] ? _copy_from_iter_full+0x25c/0x870 [ 313.857105][T11086] ? __phys_addr_symbol+0x2c/0x70 [ 313.862140][T11086] ? __check_object_size+0x171/0x437 [ 313.867450][T11086] netlink_sendmsg+0x882/0xe10 [ 313.872244][T11086] ? aa_af_perm+0x260/0x260 [ 313.877036][T11086] ? netlink_unicast+0x740/0x740 [ 313.881999][T11086] ? netlink_unicast+0x740/0x740 [ 313.886952][T11086] sock_sendmsg+0xcf/0x120 [ 313.891380][T11086] ____sys_sendmsg+0x6b9/0x7d0 [ 313.896158][T11086] ? kernel_sendmsg+0x50/0x50 [ 313.905551][T11086] ___sys_sendmsg+0x100/0x170 [ 313.910244][T11086] ? sendmsg_copy_msghdr+0x70/0x70 [ 313.915385][T11086] ? __fget_files+0x329/0x4f0 [ 313.920081][T11086] ? do_dup2+0x520/0x520 [ 313.924346][T11086] ? __fget_light+0x208/0x270 [ 313.929040][T11086] __sys_sendmsg+0xec/0x1b0 [ 313.933547][T11086] ? __sys_sendmsg_sock+0xb0/0xb0 [ 313.938580][T11086] ? vfs_write+0x15b/0x5c0 [ 313.943023][T11086] ? trace_hardirqs_off_caller+0x55/0x230 [ 313.948761][T11086] ? do_syscall_64+0x21/0x790 [ 313.953453][T11086] do_syscall_64+0xf6/0x790 [ 313.957968][T11086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.963866][T11086] RIP: 0033:0x45c679 [ 313.967778][T11086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:27:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x600, 0x0) 03:27:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x700, 0x0) [ 313.987383][T11086] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 313.995796][T11086] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 314.003768][T11086] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 314.011744][T11086] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.019717][T11086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 314.027695][T11086] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000003 03:27:03 executing program 1 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:03 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x900, 0x0) 03:27:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf0ffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:04 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xa00, 0x0) 03:27:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 314.353309][T11119] FAULT_INJECTION: forcing a failure. [ 314.353309][T11119] name failslab, interval 1, probability 0, space 0, times 0 [ 314.379981][T11119] CPU: 1 PID: 11119 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 314.389900][T11119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.399967][T11119] Call Trace: [ 314.403278][T11119] dump_stack+0x188/0x20d [ 314.407630][T11119] should_fail.cold+0x5/0x14 [ 314.412242][T11119] ? setup_fault_attr+0x1e0/0x1e0 [ 314.417288][T11119] should_failslab+0x5/0xf [ 314.421714][T11119] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 314.427161][T11119] hash_netport_create+0x363/0xd50 [ 314.432289][T11119] ? __nla_parse+0x2e/0x60 [ 314.436710][T11119] ? hash_netport6_uref+0x400/0x400 [ 314.441948][T11119] ip_set_create+0x6a7/0x13c0 [ 314.446648][T11119] ? ip_set_destroy+0xb00/0xb00 [ 314.451544][T11119] ? nla_memcpy+0xa0/0xa0 [ 314.455896][T11119] ? ip_set_destroy+0xb00/0xb00 [ 314.460764][T11119] nfnetlink_rcv_msg+0xc83/0xf30 [ 314.465732][T11119] ? nfnetlink_bind+0x2b0/0x2b0 [ 314.470610][T11119] ? consume_skb+0xfb/0x400 [ 314.475402][T11119] ? lock_downgrade+0x7f0/0x7f0 [ 314.480258][T11119] ? nlmon_xmit+0x9d/0xd0 [ 314.484596][T11119] ? __local_bh_enable_ip+0x159/0x270 [ 314.489987][T11119] ? lockdep_hardirqs_on+0x417/0x5d0 [ 314.495283][T11119] ? __dev_queue_xmit+0x174a/0x3070 [ 314.500487][T11119] ? __local_bh_enable_ip+0x159/0x270 [ 314.505863][T11119] ? __dev_queue_xmit+0xbf2/0x3070 [ 314.510999][T11119] netlink_rcv_skb+0x15a/0x410 [ 314.515780][T11119] ? nfnetlink_bind+0x2b0/0x2b0 [ 314.520652][T11119] ? netlink_ack+0xa80/0xa80 [ 314.525267][T11119] ? ns_capable_common+0xe2/0x100 [ 314.530311][T11119] nfnetlink_rcv+0x1ac/0x420 [ 314.534913][T11119] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 314.540484][T11119] netlink_unicast+0x537/0x740 [ 314.545265][T11119] ? netlink_attachskb+0x810/0x810 [ 314.550409][T11119] ? _copy_from_iter_full+0x25c/0x870 [ 314.555816][T11119] ? __phys_addr_symbol+0x2c/0x70 [ 314.560853][T11119] ? __check_object_size+0x171/0x437 [ 314.566147][T11119] netlink_sendmsg+0x882/0xe10 [ 314.570934][T11119] ? aa_af_perm+0x260/0x260 [ 314.575893][T11119] ? netlink_unicast+0x740/0x740 [ 314.580862][T11119] ? netlink_unicast+0x740/0x740 [ 314.585831][T11119] sock_sendmsg+0xcf/0x120 [ 314.590264][T11119] ____sys_sendmsg+0x6b9/0x7d0 [ 314.595039][T11119] ? kernel_sendmsg+0x50/0x50 [ 314.599741][T11119] ___sys_sendmsg+0x100/0x170 [ 314.604432][T11119] ? sendmsg_copy_msghdr+0x70/0x70 [ 314.609564][T11119] ? __fget_files+0x329/0x4f0 [ 314.614259][T11119] ? do_dup2+0x520/0x520 [ 314.618527][T11119] ? __fget_light+0x208/0x270 [ 314.623217][T11119] __sys_sendmsg+0xec/0x1b0 [ 314.627726][T11119] ? __sys_sendmsg_sock+0xb0/0xb0 [ 314.632757][T11119] ? vfs_write+0x15b/0x5c0 [ 314.637199][T11119] ? trace_hardirqs_off_caller+0x55/0x230 [ 314.642932][T11119] ? do_syscall_64+0x21/0x790 [ 314.647625][T11119] do_syscall_64+0xf6/0x790 [ 314.652141][T11119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.658034][T11119] RIP: 0033:0x45c679 [ 314.661934][T11119] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.681907][T11119] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 314.690323][T11119] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 314.698292][T11119] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 314.706261][T11119] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.714237][T11119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 314.722216][T11119] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000004 03:27:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1020, 0x0) 03:27:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:05 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4880c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x3) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001b00)=ANY=[@ANYBLOB="480000001000050700b000000000000000000000fbeee684bb81c610416860a34fe258fa2c473841730ae81b8c3ad7d7e46e8e57b392e604a874488a1ca2479a7a02cb29b33bf6663cceda159a46fdfc660fa3198fda0f28ce9e246e92f029f1533dd1b1a8a0b8d7940d30bd2c8cf487d802b43f1638e22e72a0176ee5141554ed396d8c8deab5a672edcfac9f20fe2c317683cde40f46bc4abe80dadb189abfdde923d3fc4f5a032343d2d93824d3eb8a783b723a75cbec36b4901c812a0f", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000300), 0x12) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x0, 0x1}, 0x3c) 03:27:05 executing program 1 (fault-call:4 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 315.547149][T11142] FAULT_INJECTION: forcing a failure. [ 315.547149][T11142] name failslab, interval 1, probability 0, space 0, times 0 [ 315.589080][T11142] CPU: 1 PID: 11142 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 315.598996][T11142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.609055][T11142] Call Trace: [ 315.612373][T11142] dump_stack+0x188/0x20d [ 315.616728][T11142] should_fail.cold+0x5/0x14 [ 315.621333][T11142] ? setup_fault_attr+0x1e0/0x1e0 [ 315.626380][T11142] should_failslab+0x5/0xf [ 315.630809][T11142] __kmalloc+0x2d9/0x7a0 [ 315.635055][T11142] ? ip_set_alloc+0x33/0x57 [ 315.639573][T11142] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 315.645137][T11142] ip_set_alloc+0x33/0x57 [ 315.649479][T11142] hash_netport_create+0x3fa/0xd50 [ 315.654603][T11142] ? __nla_parse+0x2e/0x60 [ 315.659026][T11142] ? hash_netport6_uref+0x400/0x400 [ 315.664236][T11142] ip_set_create+0x6a7/0x13c0 [ 315.668932][T11142] ? ip_set_destroy+0xb00/0xb00 [ 315.673829][T11142] ? nla_memcpy+0xa0/0xa0 [ 315.678178][T11142] ? ip_set_destroy+0xb00/0xb00 [ 315.683037][T11142] nfnetlink_rcv_msg+0xc83/0xf30 [ 315.688004][T11142] ? nfnetlink_bind+0x2b0/0x2b0 [ 315.692878][T11142] ? consume_skb+0xfb/0x400 [ 315.697408][T11142] ? lock_downgrade+0x7f0/0x7f0 [ 315.702268][T11142] ? nlmon_xmit+0x9d/0xd0 [ 315.706615][T11142] ? __local_bh_enable_ip+0x159/0x270 [ 315.712003][T11142] ? lockdep_hardirqs_on+0x417/0x5d0 [ 315.717295][T11142] ? __dev_queue_xmit+0x174a/0x3070 [ 315.722495][T11142] ? __local_bh_enable_ip+0x159/0x270 [ 315.727874][T11142] ? __dev_queue_xmit+0xbf2/0x3070 [ 315.733014][T11142] netlink_rcv_skb+0x15a/0x410 03:27:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x2000, 0x0) 03:27:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 315.737785][T11142] ? nfnetlink_bind+0x2b0/0x2b0 [ 315.742646][T11142] ? netlink_ack+0xa80/0xa80 [ 315.747255][T11142] ? ns_capable_common+0xe2/0x100 [ 315.752296][T11142] nfnetlink_rcv+0x1ac/0x420 [ 315.756899][T11142] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 315.762384][T11142] netlink_unicast+0x537/0x740 [ 315.767168][T11142] ? netlink_attachskb+0x810/0x810 [ 315.772289][T11142] ? _copy_from_iter_full+0x25c/0x870 [ 315.777670][T11142] ? __phys_addr_symbol+0x2c/0x70 [ 315.782710][T11142] ? __check_object_size+0x171/0x437 [ 315.788012][T11142] netlink_sendmsg+0x882/0xe10 [ 315.792791][T11142] ? aa_af_perm+0x260/0x260 [ 315.797310][T11142] ? netlink_unicast+0x740/0x740 [ 315.802370][T11142] ? netlink_unicast+0x740/0x740 [ 315.807331][T11142] sock_sendmsg+0xcf/0x120 [ 315.811762][T11142] ____sys_sendmsg+0x6b9/0x7d0 [ 315.816540][T11142] ? kernel_sendmsg+0x50/0x50 [ 315.821251][T11142] ___sys_sendmsg+0x100/0x170 [ 315.825944][T11142] ? sendmsg_copy_msghdr+0x70/0x70 [ 315.831082][T11142] ? __fget_files+0x329/0x4f0 [ 315.835776][T11142] ? do_dup2+0x520/0x520 [ 315.840047][T11142] ? __fget_light+0x208/0x270 [ 315.844739][T11142] __sys_sendmsg+0xec/0x1b0 [ 315.849248][T11142] ? __sys_sendmsg_sock+0xb0/0xb0 [ 315.854280][T11142] ? vfs_write+0x15b/0x5c0 [ 315.858718][T11142] ? trace_hardirqs_off_caller+0x55/0x230 [ 315.864559][T11142] ? do_syscall_64+0x21/0x790 [ 315.869249][T11142] do_syscall_64+0xf6/0x790 [ 315.873767][T11142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.880075][T11142] RIP: 0033:0x45c679 03:27:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x2010, 0x0) [ 315.883971][T11142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.903578][T11142] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 315.911994][T11142] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 315.919972][T11142] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 315.927961][T11142] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 03:27:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffffff5, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 315.935932][T11142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 315.943904][T11142] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000005 03:27:05 executing program 1 (fault-call:4 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffffffc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:05 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4800, 0x0) [ 316.248994][T11173] FAULT_INJECTION: forcing a failure. [ 316.248994][T11173] name failslab, interval 1, probability 0, space 0, times 0 03:27:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 316.291135][T11173] CPU: 1 PID: 11173 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 316.301046][T11173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.311099][T11173] Call Trace: [ 316.314475][T11173] dump_stack+0x188/0x20d [ 316.318849][T11173] should_fail.cold+0x5/0x14 [ 316.324586][T11173] ? setup_fault_attr+0x1e0/0x1e0 [ 316.329640][T11173] should_failslab+0x5/0xf [ 316.334071][T11173] __kmalloc+0x2d9/0x7a0 [ 316.338319][T11173] ? ip_set_alloc+0x33/0x57 [ 316.342830][T11173] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 316.348407][T11173] ip_set_alloc+0x33/0x57 [ 316.352753][T11173] hash_netport_create+0x449/0xd50 [ 316.357881][T11173] ? __nla_parse+0x2e/0x60 [ 316.362320][T11173] ? hash_netport6_uref+0x400/0x400 [ 316.367531][T11173] ip_set_create+0x6a7/0x13c0 [ 316.372235][T11173] ? ip_set_destroy+0xb00/0xb00 [ 316.377588][T11173] ? nla_memcpy+0xa0/0xa0 [ 316.381937][T11173] ? ip_set_destroy+0xb00/0xb00 [ 316.386797][T11173] nfnetlink_rcv_msg+0xc83/0xf30 [ 316.391766][T11173] ? nfnetlink_bind+0x2b0/0x2b0 [ 316.396642][T11173] ? consume_skb+0xfb/0x400 [ 316.401155][T11173] ? lock_downgrade+0x7f0/0x7f0 [ 316.406014][T11173] ? nlmon_xmit+0x9d/0xd0 [ 316.410356][T11173] ? __local_bh_enable_ip+0x159/0x270 [ 316.415736][T11173] ? lockdep_hardirqs_on+0x417/0x5d0 [ 316.421548][T11173] ? __dev_queue_xmit+0x174a/0x3070 [ 316.426747][T11173] ? __local_bh_enable_ip+0x159/0x270 [ 316.432129][T11173] ? __dev_queue_xmit+0xbf2/0x3070 [ 316.437263][T11173] netlink_rcv_skb+0x15a/0x410 [ 316.442038][T11173] ? nfnetlink_bind+0x2b0/0x2b0 [ 316.446901][T11173] ? netlink_ack+0xa80/0xa80 [ 316.451506][T11173] ? ns_capable_common+0xe2/0x100 [ 316.456544][T11173] nfnetlink_rcv+0x1ac/0x420 [ 316.461143][T11173] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 316.466622][T11173] netlink_unicast+0x537/0x740 [ 316.471408][T11173] ? netlink_attachskb+0x810/0x810 [ 316.476528][T11173] ? _copy_from_iter_full+0x25c/0x870 [ 316.481906][T11173] ? __phys_addr_symbol+0x2c/0x70 [ 316.486940][T11173] ? __check_object_size+0x171/0x437 [ 316.492245][T11173] netlink_sendmsg+0x882/0xe10 [ 316.497034][T11173] ? aa_af_perm+0x260/0x260 [ 316.501546][T11173] ? netlink_unicast+0x740/0x740 [ 316.506508][T11173] ? netlink_unicast+0x740/0x740 [ 316.511458][T11173] sock_sendmsg+0xcf/0x120 [ 316.515884][T11173] ____sys_sendmsg+0x6b9/0x7d0 [ 316.520660][T11173] ? kernel_sendmsg+0x50/0x50 [ 316.525361][T11173] ___sys_sendmsg+0x100/0x170 [ 316.530054][T11173] ? sendmsg_copy_msghdr+0x70/0x70 [ 316.535191][T11173] ? __fget_files+0x329/0x4f0 [ 316.539889][T11173] ? do_dup2+0x520/0x520 [ 316.544149][T11173] ? __fget_light+0x208/0x270 [ 316.548840][T11173] __sys_sendmsg+0xec/0x1b0 [ 316.553351][T11173] ? __sys_sendmsg_sock+0xb0/0xb0 [ 316.558386][T11173] ? vfs_write+0x15b/0x5c0 [ 316.562851][T11173] ? trace_hardirqs_off_caller+0x55/0x230 [ 316.568578][T11173] ? do_syscall_64+0x21/0x790 [ 316.573265][T11173] do_syscall_64+0xf6/0x790 [ 316.577782][T11173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.583674][T11173] RIP: 0033:0x45c679 [ 316.587567][T11173] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.607261][T11173] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 316.615677][T11173] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 316.623647][T11173] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 316.631618][T11173] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.639596][T11173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 316.647576][T11173] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000006 [ 317.080624][T11151] syz-executor.0 (11151) used greatest stack depth: 22504 bytes left 03:27:06 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4880c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x3) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001b00)=ANY=[@ANYBLOB="480000001000050700b000000000000000000000fbeee684bb81c610416860a34fe258fa2c473841730ae81b8c3ad7d7e46e8e57b392e604a874488a1ca2479a7a02cb29b33bf6663cceda159a46fdfc660fa3198fda0f28ce9e246e92f029f1533dd1b1a8a0b8d7940d30bd2c8cf487d802b43f1638e22e72a0176ee5141554ed396d8c8deab5a672edcfac9f20fe2c317683cde40f46bc4abe80dadb189abfdde923d3fc4f5a032343d2d93824d3eb8a783b723a75cbec36b4901c812a0f", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000300), 0x12) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x0, 0x1}, 0x3c) 03:27:06 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4c00, 0x0) 03:27:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:06 executing program 1 (fault-call:4 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 317.256356][T11199] FAULT_INJECTION: forcing a failure. [ 317.256356][T11199] name failslab, interval 1, probability 0, space 0, times 0 03:27:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6800, 0x0) 03:27:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xf, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 317.297057][T11199] CPU: 1 PID: 11199 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 317.306964][T11199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.317013][T11199] Call Trace: [ 317.320321][T11199] dump_stack+0x188/0x20d [ 317.324672][T11199] should_fail.cold+0x5/0x14 [ 317.329303][T11199] ? lock_downgrade+0x7f0/0x7f0 [ 317.334182][T11199] ? setup_fault_attr+0x1e0/0x1e0 [ 317.339228][T11199] should_failslab+0x5/0xf [ 317.343656][T11199] kmem_cache_alloc_node+0x25c/0x760 [ 317.348959][T11199] ? nfnetlink_bind+0x2b0/0x2b0 [ 317.353830][T11199] __alloc_skb+0xba/0x5a0 [ 317.358196][T11199] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 317.363761][T11199] ? consume_skb+0xfb/0x400 [ 317.368271][T11199] ? lock_downgrade+0x7f0/0x7f0 [ 317.373133][T11199] ? nlmon_xmit+0x9d/0xd0 [ 317.377478][T11199] netlink_ack+0x234/0xa80 [ 317.381923][T11199] ? __local_bh_enable_ip+0x159/0x270 [ 317.387304][T11199] ? netlink_sendmsg+0xe10/0xe10 [ 317.392303][T11199] ? __dev_queue_xmit+0xbf2/0x3070 03:27:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xc0, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xe000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 317.397435][T11199] netlink_rcv_skb+0x332/0x410 [ 317.402215][T11199] ? nfnetlink_bind+0x2b0/0x2b0 [ 317.407074][T11199] ? netlink_ack+0xa80/0xa80 [ 317.411683][T11199] ? ns_capable_common+0xe2/0x100 [ 317.416717][T11199] nfnetlink_rcv+0x1ac/0x420 [ 317.421311][T11199] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 317.426790][T11199] netlink_unicast+0x537/0x740 [ 317.431565][T11199] ? netlink_attachskb+0x810/0x810 [ 317.436687][T11199] ? _copy_from_iter_full+0x25c/0x870 [ 317.442068][T11199] ? __phys_addr_symbol+0x2c/0x70 03:27:07 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6c00, 0x0) [ 317.447098][T11199] ? __check_object_size+0x171/0x437 [ 317.452400][T11199] netlink_sendmsg+0x882/0xe10 [ 317.457180][T11199] ? aa_af_perm+0x260/0x260 [ 317.461691][T11199] ? netlink_unicast+0x740/0x740 [ 317.466651][T11199] ? netlink_unicast+0x740/0x740 [ 317.471598][T11199] sock_sendmsg+0xcf/0x120 [ 317.476026][T11199] ____sys_sendmsg+0x6b9/0x7d0 [ 317.480818][T11199] ? kernel_sendmsg+0x50/0x50 [ 317.485523][T11199] ___sys_sendmsg+0x100/0x170 [ 317.490211][T11199] ? sendmsg_copy_msghdr+0x70/0x70 [ 317.495345][T11199] ? __fget_files+0x329/0x4f0 [ 317.500058][T11199] ? do_dup2+0x520/0x520 [ 317.504316][T11199] ? __fget_light+0x208/0x270 [ 317.509009][T11199] __sys_sendmsg+0xec/0x1b0 [ 317.513517][T11199] ? __sys_sendmsg_sock+0xb0/0xb0 [ 317.518547][T11199] ? vfs_write+0x15b/0x5c0 [ 317.522985][T11199] ? trace_hardirqs_off_caller+0x55/0x230 [ 317.528726][T11199] ? do_syscall_64+0x21/0x790 [ 317.533464][T11199] do_syscall_64+0xf6/0x790 [ 317.537986][T11199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.543886][T11199] RIP: 0033:0x45c679 [ 317.547795][T11199] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.567396][T11199] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.575807][T11199] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 317.583784][T11199] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 317.591758][T11199] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.599728][T11199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 317.607702][T11199] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000007 03:27:08 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4880c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x3) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001b00)=ANY=[@ANYBLOB="480000001000050700b000000000000000000000fbeee684bb81c610416860a34fe258fa2c473841730ae81b8c3ad7d7e46e8e57b392e604a874488a1ca2479a7a02cb29b33bf6663cceda159a46fdfc660fa3198fda0f28ce9e246e92f029f1533dd1b1a8a0b8d7940d30bd2c8cf487d802b43f1638e22e72a0176ee5141554ed396d8c8deab5a672edcfac9f20fe2c317683cde40f46bc4abe80dadb189abfdde923d3fc4f5a032343d2d93824d3eb8a783b723a75cbec36b4901c812a0f", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32], 0x4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000300), 0x12) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x0, 0x1}, 0x3c) 03:27:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xec0, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7400, 0x0) 03:27:08 executing program 1 (fault-call:4 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 318.354022][T11235] FAULT_INJECTION: forcing a failure. [ 318.354022][T11235] name failslab, interval 1, probability 0, space 0, times 0 [ 318.385056][T11235] CPU: 1 PID: 11235 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 318.394962][T11235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.405023][T11235] Call Trace: [ 318.408328][T11235] dump_stack+0x188/0x20d [ 318.412685][T11235] should_fail.cold+0x5/0x14 [ 318.417296][T11235] ? lock_downgrade+0x7f0/0x7f0 [ 318.422161][T11235] ? setup_fault_attr+0x1e0/0x1e0 [ 318.427203][T11235] should_failslab+0x5/0xf [ 318.431627][T11235] kmem_cache_alloc_node_trace+0x27c/0x790 [ 318.437444][T11235] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 318.443453][T11235] __kmalloc_node_track_caller+0x38/0x60 [ 318.449096][T11235] __kmalloc_reserve.isra.0+0x39/0xe0 03:27:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x3f000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x33fe0, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 318.454488][T11235] __alloc_skb+0xef/0x5a0 [ 318.458846][T11235] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 318.464407][T11235] ? consume_skb+0xfb/0x400 [ 318.468930][T11235] ? lock_downgrade+0x7f0/0x7f0 [ 318.473788][T11235] ? nlmon_xmit+0x9d/0xd0 [ 318.478130][T11235] netlink_ack+0x234/0xa80 [ 318.482563][T11235] ? __local_bh_enable_ip+0x159/0x270 [ 318.487938][T11235] ? netlink_sendmsg+0xe10/0xe10 [ 318.492878][T11235] ? __dev_queue_xmit+0xbf2/0x3070 [ 318.498010][T11235] netlink_rcv_skb+0x332/0x410 [ 318.502785][T11235] ? nfnetlink_bind+0x2b0/0x2b0 [ 318.507642][T11235] ? netlink_ack+0xa80/0xa80 [ 318.512262][T11235] ? ns_capable_common+0xe2/0x100 [ 318.517298][T11235] nfnetlink_rcv+0x1ac/0x420 [ 318.521890][T11235] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 318.527375][T11235] netlink_unicast+0x537/0x740 [ 318.532155][T11235] ? netlink_attachskb+0x810/0x810 [ 318.537277][T11235] ? _copy_from_iter_full+0x25c/0x870 [ 318.542668][T11235] ? __phys_addr_symbol+0x2c/0x70 [ 318.547703][T11235] ? __check_object_size+0x171/0x437 [ 318.553003][T11235] netlink_sendmsg+0x882/0xe10 [ 318.557785][T11235] ? aa_af_perm+0x260/0x260 [ 318.562293][T11235] ? netlink_unicast+0x740/0x740 [ 318.567256][T11235] ? netlink_unicast+0x740/0x740 [ 318.572217][T11235] sock_sendmsg+0xcf/0x120 [ 318.576655][T11235] ____sys_sendmsg+0x6b9/0x7d0 [ 318.581437][T11235] ? kernel_sendmsg+0x50/0x50 [ 318.586142][T11235] ___sys_sendmsg+0x100/0x170 [ 318.590832][T11235] ? sendmsg_copy_msghdr+0x70/0x70 [ 318.595967][T11235] ? __fget_files+0x329/0x4f0 [ 318.600666][T11235] ? do_dup2+0x520/0x520 [ 318.604931][T11235] ? __fget_light+0x208/0x270 [ 318.609626][T11235] __sys_sendmsg+0xec/0x1b0 [ 318.614151][T11235] ? __sys_sendmsg_sock+0xb0/0xb0 [ 318.619185][T11235] ? vfs_write+0x15b/0x5c0 [ 318.623635][T11235] ? trace_hardirqs_off_caller+0x55/0x230 [ 318.629365][T11235] ? do_syscall_64+0x21/0x790 [ 318.634054][T11235] do_syscall_64+0xf6/0x790 [ 318.638570][T11235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.644464][T11235] RIP: 0033:0x45c679 03:27:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2000005c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 318.648365][T11235] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.668069][T11235] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.676502][T11235] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 [ 318.684483][T11235] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 318.692468][T11235] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 318.700448][T11235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 318.708428][T11235] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000008 03:27:08 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7a00, 0x0) 03:27:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x7ffff000, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xedc0, 0x0) 03:27:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x72000000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 1 (fault-call:4 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xfffffdef, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 319.593115][T11276] FAULT_INJECTION: forcing a failure. [ 319.593115][T11276] name failslab, interval 1, probability 0, space 0, times 0 [ 319.635391][T11276] CPU: 1 PID: 11276 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 319.645336][T11276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.655397][T11276] Call Trace: [ 319.658697][T11276] dump_stack+0x188/0x20d [ 319.663071][T11276] should_fail.cold+0x5/0x14 [ 319.667672][T11276] ? setup_fault_attr+0x1e0/0x1e0 [ 319.672716][T11276] ? mark_held_locks+0xe0/0xe0 [ 319.677495][T11276] should_failslab+0x5/0xf [ 319.681951][T11276] kmem_cache_alloc+0x44/0x730 [ 319.686730][T11276] ? lock_acquire+0x197/0x420 [ 319.691433][T11276] skb_clone+0x14d/0x3c0 [ 319.695694][T11276] netlink_deliver_tap+0x91c/0xb50 [ 319.700829][T11276] __netlink_sendskb+0x5b/0xb0 [ 319.705602][T11276] netlink_unicast+0x651/0x740 [ 319.710381][T11276] ? netlink_attachskb+0x810/0x810 [ 319.715498][T11276] ? skb_put+0x15d/0x1c0 [ 319.719749][T11276] ? memset+0x20/0x40 [ 319.723744][T11276] ? __nlmsg_put+0x14b/0x1b0 [ 319.728346][T11276] netlink_ack+0x5a2/0xa80 [ 319.732775][T11276] ? __local_bh_enable_ip+0x159/0x270 [ 319.738155][T11276] ? netlink_sendmsg+0xe10/0xe10 [ 319.743104][T11276] ? __dev_queue_xmit+0xbf2/0x3070 [ 319.748231][T11276] netlink_rcv_skb+0x332/0x410 [ 319.753000][T11276] ? nfnetlink_bind+0x2b0/0x2b0 [ 319.757862][T11276] ? netlink_ack+0xa80/0xa80 [ 319.762473][T11276] ? ns_capable_common+0xe2/0x100 [ 319.767518][T11276] nfnetlink_rcv+0x1ac/0x420 [ 319.772114][T11276] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 319.777594][T11276] netlink_unicast+0x537/0x740 [ 319.782374][T11276] ? netlink_attachskb+0x810/0x810 [ 319.787488][T11276] ? _copy_from_iter_full+0x25c/0x870 [ 319.792865][T11276] ? __phys_addr_symbol+0x2c/0x70 [ 319.797900][T11276] ? __check_object_size+0x171/0x437 [ 319.803208][T11276] netlink_sendmsg+0x882/0xe10 [ 319.807986][T11276] ? aa_af_perm+0x260/0x260 [ 319.812497][T11276] ? netlink_unicast+0x740/0x740 [ 319.817463][T11276] ? netlink_unicast+0x740/0x740 [ 319.822412][T11276] sock_sendmsg+0xcf/0x120 [ 319.826842][T11276] ____sys_sendmsg+0x6b9/0x7d0 [ 319.831623][T11276] ? kernel_sendmsg+0x50/0x50 [ 319.836337][T11276] ___sys_sendmsg+0x100/0x170 [ 319.841028][T11276] ? sendmsg_copy_msghdr+0x70/0x70 [ 319.846157][T11276] ? __fget_files+0x329/0x4f0 [ 319.850846][T11276] ? do_dup2+0x520/0x520 [ 319.855111][T11276] ? __fget_light+0x208/0x270 [ 319.859810][T11276] __sys_sendmsg+0xec/0x1b0 [ 319.864321][T11276] ? __sys_sendmsg_sock+0xb0/0xb0 [ 319.869355][T11276] ? vfs_write+0x15b/0x5c0 [ 319.873799][T11276] ? trace_hardirqs_off_caller+0x55/0x230 [ 319.879532][T11276] ? do_syscall_64+0x21/0x790 [ 319.884658][T11276] do_syscall_64+0xf6/0x790 [ 319.889176][T11276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.895078][T11276] RIP: 0033:0x45c679 [ 319.898983][T11276] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.918589][T11276] RSP: 002b:00007fda15e23c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 319.927010][T11276] RAX: ffffffffffffffda RBX: 00007fda15e246d4 RCX: 000000000045c679 03:27:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x10, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) r1 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17, 0x0, 0x8, 0x0, 0x10, "8100"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x8000}, 0x8) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'system.', 'em0\x00'}, &(0x7f0000000080)='self&selinuxem0\x00', 0x10, 0x4) 03:27:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf000, 0x0) 03:27:09 executing program 1 (fault-call:4 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 319.934986][T11276] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000006 [ 319.942959][T11276] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 319.950934][T11276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 319.958907][T11276] R13: 000000000000091f R14: 00000000004cb9e2 R15: 0000000000000009 03:27:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x9, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:09 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xff00, 0x0) 03:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xf5ffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0xb, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfcffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf0ffff, 0x0) 03:27:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:10 executing program 0: socket$netlink(0x10, 0x3, 0xc) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r4) sched_getaffinity(r4, 0x8, &(0x7f0000000100)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r6 = fcntl$dupfd(r3, 0x406, r5) setsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x4) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x2000000, &(0x7f0000000080)=0x4) 03:27:10 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000000, 0x0) 03:27:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:11 executing program 0: syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffff80d7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="5846534200001000000000000000100000000000000040000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9fffffffb8000000000000000821c000001000010000000000100000000000001c034a40200010000100700040000000000000000000c0908040c0993ed196ccbbd44837a4f997406721ecba0bb0577212e34b5b6be9b0c77197fa6524f16dd4ef679f3d4adce3a2fb329c8ff3c4468", 0xb2}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="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", 0xff, r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x202201, 0x0) getsockname$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c) setsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000180)="842fea18f0042ec6aef27ae71ac9bc8f2c1d12964db71c948b348ce67b7f59aa52b395", 0x23) 03:27:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000005, 0x0) 03:27:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x2, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffffff5, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x3, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 321.682159][ T3562] XFS (loop0): Superblock earlier than Version 5 has XFS_[PQ]UOTA_{ENFD|CHKD} bits. [ 321.692319][ T3562] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x3c9/0x4e0, xfs_sb block 0xffffffffffffffff [ 321.704549][ T3562] XFS (loop0): Unmount and run xfs_repair [ 321.710426][ T3562] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 321.717902][ T3562] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 321.727107][ T3562] 00000010: 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 ......@......... [ 321.736356][ T3562] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 321.746711][ T3562] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 321.755771][ T3562] 00000040: 00 00 f9 ff ff ff fb 80 00 00 00 00 00 00 00 82 ................ [ 321.765006][ T3562] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 321.774120][ T3562] 00000060: 00 00 01 c0 34 a4 02 00 01 00 00 10 07 00 04 00 ....4........... 03:27:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:11 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x2000000, 0x0) [ 321.789955][ T3562] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 09 93 ed ................ [ 321.799020][T11372] XFS (loop0): SB validate failed with error -117. [ 322.185907][ T3562] XFS (loop0): Superblock earlier than Version 5 has XFS_[PQ]UOTA_{ENFD|CHKD} bits. [ 322.196015][ T3562] XFS (loop0): Metadata corruption detected at xfs_sb_read_verify+0x3c9/0x4e0, xfs_sb block 0xffffffffffffffff [ 322.208188][ T3562] XFS (loop0): Unmount and run xfs_repair [ 322.214465][ T3562] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 322.222097][ T3562] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 322.231210][ T3562] 00000010: 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 ......@......... [ 322.240268][ T3562] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 322.249244][ T3562] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 322.258323][ T3562] 00000040: 00 00 f9 ff ff ff fb 80 00 00 00 00 00 00 00 82 ................ [ 322.267299][ T3562] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 322.276250][ T3562] 00000060: 00 00 01 c0 34 a4 02 00 01 00 00 10 07 00 04 00 ....4........... [ 322.285219][ T3562] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 0c 09 93 ed ................ [ 322.294651][T11372] XFS (loop0): SB validate failed with error -117. 03:27:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x7, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r3, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:27:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x4, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xfffffffc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x3000000, 0x0) 03:27:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xa, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0xffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4000000, 0x0) 03:27:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xe, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xf, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xe, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:12 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x5000000, 0x0) 03:27:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) recvmsg$kcm(r1, &(0x7f0000001300)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/158, 0x9e}, {&(0x7f0000000140)=""/139, 0x8b}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/87, 0x57}], 0x4, &(0x7f0000000300)=""/4096, 0x1000}, 0x21a0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x1c, r3, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x6}]}, 0x1c}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) setsockopt$bt_hci_HCI_TIME_STAMP(r7, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r7, 0x551f) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000001ac0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000001bc0)=0xe8) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000001cc0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001c00)=ANY=[@ANYBLOB="64040000", @ANYRES16=r3, @ANYBLOB="00012dbd7000fedbdf251400000008000300", @ANYRES32=r5, @ANYBLOB="06003600010000000c004300400000004000000006001a010400000008000300", @ANYRES32=r8, @ANYBLOB="0a000600aaaaaaaaaaaa00000500e400000000000600ed00b60400000500130102000000"], 0x64}, 0x1, 0x0, 0x0, 0xc0e1f392d5df1f20}, 0x804) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:27:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xc0, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xec0, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x60, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x5000001, 0x0) [ 323.473592][T11470] IPVS: ftp: loaded support on port[0] = 21 03:27:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x33fe0, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x60, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 324.029969][ T619] tipc: TX() has been purged, node left! [ 324.185077][T11470] IPVS: ftp: loaded support on port[0] = 21 03:27:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xdb, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2000005c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:13 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6000000, 0x0) 03:27:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x74, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb76ea7211439a321f589f32be513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b143521435cb49840b0f61274420a5d97"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b}, 0x20}}, 0x0) 03:27:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x7ffff000, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:14 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7000000, 0x0) 03:27:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0xfffffdef, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 324.467775][T11520] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 03:27:14 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x8000000, 0x0) [ 324.729467][T11527] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 03:27:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x10, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x300, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:14 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x9000000, 0x0) 03:27:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x300, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:14 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000000)={r7, 0x0, 0x7, 0x2e11}, &(0x7f0000000040)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 03:27:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x9, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:14 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xa000000, 0x0) 03:27:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xa00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x700, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0xb, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x10000000, 0x0) 03:27:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xe00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xa00, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:15 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x20000000, 0x0) 03:27:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x20100000, 0x0) 03:27:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x8, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xe00, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:16 executing program 0: socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="580000000200078008001240000000000900020073797a3100000000050001000700000012100300686173683a6e65742c706f7274000008050004ff7f0000000500050002000000"], 0x58}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0)="3acfd6fae929be3f7926712462123cd63be549ebf4039e77a0f6388de2aa300fc2da11db28125bef81c0edb0130b3d3e9443f6b37ae26b8921e046c54fa059b597", 0x41, r1}, 0x68) r2 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000002c008151090f80ecdb4cb904054865160b00010005000100000c00190e000600000000011c0000000300c390402ad92ad7209db34da06b7348ff8a336fa6aac68f77a05ae53d8c856fd0627aa16538bb1287912000124d12245583fa0e4b71208066a3cb9864a23d9ee56535b0fe1923397cc827cf67adc1e96f0b5cd28fbbb6bc05e04ad8fe30f8bbdb5db8c2234e0ea6fa8dff", 0x98}], 0x1}, 0x4000094) 03:27:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x48000000, 0x0) 03:27:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x4000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf00, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:16 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)=0x6) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:27:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4c000000, 0x0) 03:27:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x6000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x2, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x68000000, 0x0) 03:27:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x3f00, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x7400, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6c000000, 0x0) 03:27:17 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f00000002c0)=@sco={0x1f, @fixed={[], 0x11}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000040)="a6", 0x1}, {&(0x7f0000000180)="f4fa3863bd96d79b1481d1545fe45e6c538e15b5090b4250d8aafdc3e40845358710557cd96030577c7b749a133d1fcfc4e4c64b002f00a67d70bf7eb680210ca07eda7eb387e402a7cbc771a7f709d14139bab85163e895aa6225995aded1ec91f7f1d56cbebb29318243b546fcb2c1fe0d595b325539081887efc2d0a3f1051204744d2ff4e191d4c7963b6f8abb44896d5f193df0a39dffe93be426b5198062595f7be452a1d5c4ee3bf3f255695ec179b0265859b2538d072aa5c0a025d07d3b927b523d1ac9fea5bd54404e51aeb664260cc11b5cf09590f2fdfe06ac293566a9", 0xe3}, {&(0x7f0000000340)="38f82bb0f446adaf96ceae584b99c47e663345ce98decbcce725a7007b589a4c5d0eda23b6df386a8cf50de434408afd58eb780eda184355c6acad92b608ab29bf89cebbf204e02eaf336dddb3fd3444e85419b5a17e5c3fdfc94dc39921269e126a514c", 0x64}], 0x3}, 0x0) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000000c0)="99da", 0x33c00}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x2) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000580)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}, @IPSET_ATTR_PROTO={0x0, 0x7, 0x29}, @IPSET_ATTR_MAXELEM]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x3, 0x5, 0x2}]}, 0x58}}, 0x0) nanosleep(&(0x7f0000000780)={0x0, 0x1c9c380}, &(0x7f00000007c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) setsockopt$bt_hci_HCI_TIME_STAMP(r6, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r6, 0x551f) ioctl$VIDIOC_S_EXT_CTRLS(r6, 0xc0205648, &(0x7f00000003c0)={0x0, 0x8, 0x5, r4, 0x0, &(0x7f0000000280)={0x980929, 0xdb70, [], @p_u32=&(0x7f0000000000)=0x3}}) r8 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, 0x0, 0x0) add_key(&(0x7f0000000480)='big_key\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="391de042f4a945dd7b5970e53aeedb534f733dd07ad313e5e9b096a2c825b34b0ff360fa2fc63c2737e5a6d1992b39", 0x2f, r8) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r7, 0x4112, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r3, 0x541c, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) setsockopt$bt_hci_HCI_TIME_STAMP(r10, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$SIOCPNDELRESOURCE(r7, 0x89ef, &(0x7f0000000740)=0x20000000) ioctl$USBDEVFS_GET_SPEED(r10, 0x551f) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x81008021}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x7c, 0x1, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xfcd}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x200}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9a0d414f17286dc4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x880}, 0x40) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r10, 0x40505412, &(0x7f0000000400)={0x2, 0x1000, 0x0, 0x0, 0x2}) 03:27:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x3, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x6000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:17 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r0 = shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0xc800) shmctl$IPC_RMID(r0, 0x0) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) shmget(0x2, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) r1 = shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) time(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0xc800) 03:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x74000000, 0x0) 03:27:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x4, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x34000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xdb00, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xb86004, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES64=r2], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048020) 03:27:17 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7a000000, 0x0) 03:27:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xa, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x400300, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x8cffffff, 0x0) 03:27:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xe, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf0ffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:18 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="5000000002060500000000000000000900220073797a32000000000c000780050014000800000005000100070004000000000005000500020000000c000300686173a0683a6970000000000009640046e302e8dff3cc098c01942f29eb95703bfafcd8cbe7a314c0a7d6ed761a3587113f4354e501ab989a14a7d3f67c89145fa3b815ccd76cac2a34dac5841bc2a45eb5a45a207e3301fda79b0b65e68b89b787c315b0e9a2d72f258c87bb07939aef8425b75bf87ceefe2ad91a9315066423ee3c254bae469e26236da814c5cdc3778250477b90728a3f818c78954123a7643ef861618e1db1672b567e846549da0123481daad642c1a6"], 0x50}}, 0x0) 03:27:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x34000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xc0ed0000, 0x0) 03:27:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 328.949738][T11736] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 03:27:18 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf6ffffff, 0x0) 03:27:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x1000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:18 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0xff5f) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x104, 0x6}, 0x60, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x5}, {&(0x7f0000000840)='\x00', 0xff5e}], 0x2, 0x0, 0x0, 0x1a0}, 0x80) 03:27:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x400300, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x60, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 329.320028][ T619] tipc: TX() has been purged, node left! 03:27:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x2000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x72, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:19 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf9fdffff, 0x0) 03:27:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf0ffff, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x40800000000003, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 03:27:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x1000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:19 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfeffffff, 0x0) 03:27:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x3000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x300, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x4000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) r2 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x640, [0x20000440, 0x0, 0x0, 0x20000744, 0x200008ba], 0x0, &(0x7f0000000040), &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x3, 0x33, 0x8, 'bridge_slave_0\x00', 'veth0\x00', 'lo\x00', 'ip6erspan0\x00', @dev={[], 0x26}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff], 0xae, 0x12e, 0x166, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0x2, 0x80000000, 0xbcbe, 0x8, 0x6}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xaf, 0xe5, {0x7}}}}], @snat={'snat\x00', 0x10, {{@multicast}}}}, {0x3, 0x6a, 0x7, 'gretap0\x00', 'geneve0\x00', 'veth0_macvtap\x00', 'team_slave_0\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0x136, 0x16e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz1\x00', 0x80000001}}}, @owner={{'owner\x00', 0x0, 0x18}, {{r2, r3, r4, r6, 0x4, 0x7}}}], [@arpreply={'arpreply\x00', 0x10, {{@random="584bb6431a7c", 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0x48, 0x1b, 'hsr0\x00', 'gretap0\x00', 'batadv0\x00', 'hsr0\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @link_local, [0x0, 0x7f], 0x9e, 0x10e, 0x146, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x6, 0x10, 0x7}}}], [@snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0x10, {{@multicast, 0xfffffffffffffffc}}}], @arpreply={'arpreply\x00', 0x10, {{@multicast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x5, 0x48, 0xf7, 'sit0\x00', 'macvlan1\x00', 'gretap0\x00', 'dummy0\x00', @remote, [0xff, 0x57d9da7533fee243], @multicast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xe6, 0x15e, 0x196, [@pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x2}}}, @ip={{'ip\x00', 0x0, 0x20}, {{@empty, @dev={0xac, 0x14, 0x14, 0x15}, 0xffffff00, 0x0, 0x8, 0x6c, 0x20, 0x28, 0x4e22, 0x4e20, 0x4e20, 0x4e23}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x8001, 0x2, 0x0, 0x0, "b80a5752b87c1183404f89b58ae90054c335f251ff84039aa29234c7a676a8bb8bc7a77423d9d2517c47043ca6d156f161d8db71c2b16de3cf7cc84f82e95941"}}}], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}]}, 0x6b8) 03:27:20 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xff000000, 0x0) 03:27:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x2000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xa00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xa000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xe00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:20 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfffff000, 0x0) 03:27:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xe000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x3000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) r2 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x640, [0x20000440, 0x0, 0x0, 0x20000744, 0x200008ba], 0x0, &(0x7f0000000040), &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x3, 0x33, 0x8, 'bridge_slave_0\x00', 'veth0\x00', 'lo\x00', 'ip6erspan0\x00', @dev={[], 0x26}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff], 0xae, 0x12e, 0x166, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0x2, 0x80000000, 0xbcbe, 0x8, 0x6}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xaf, 0xe5, {0x7}}}}], @snat={'snat\x00', 0x10, {{@multicast}}}}, {0x3, 0x6a, 0x7, 'gretap0\x00', 'geneve0\x00', 'veth0_macvtap\x00', 'team_slave_0\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0x136, 0x16e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz1\x00', 0x80000001}}}, @owner={{'owner\x00', 0x0, 0x18}, {{r2, r3, r4, r6, 0x4, 0x7}}}], [@arpreply={'arpreply\x00', 0x10, {{@random="584bb6431a7c", 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0x48, 0x1b, 'hsr0\x00', 'gretap0\x00', 'batadv0\x00', 'hsr0\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @link_local, [0x0, 0x7f], 0x9e, 0x10e, 0x146, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x6, 0x10, 0x7}}}], [@snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0x10, {{@multicast, 0xfffffffffffffffc}}}], @arpreply={'arpreply\x00', 0x10, {{@multicast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x5, 0x48, 0xf7, 'sit0\x00', 'macvlan1\x00', 'gretap0\x00', 'dummy0\x00', @remote, [0xff, 0x57d9da7533fee243], @multicast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xe6, 0x15e, 0x196, [@pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x2}}}, @ip={{'ip\x00', 0x0, 0x20}, {{@empty, @dev={0xac, 0x14, 0x14, 0x15}, 0xffffff00, 0x0, 0x8, 0x6c, 0x20, 0x28, 0x4e22, 0x4e20, 0x4e20, 0x4e23}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x8001, 0x2, 0x0, 0x0, "b80a5752b87c1183404f89b58ae90054c335f251ff84039aa29234c7a676a8bb8bc7a77423d9d2517c47043ca6d156f161d8db71c2b16de3cf7cc84f82e95941"}}}], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}]}, 0x6b8) 03:27:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:21 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfffffdf9, 0x0) 03:27:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x4000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x3f00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) r2 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x640, [0x20000440, 0x0, 0x0, 0x20000744, 0x200008ba], 0x0, &(0x7f0000000040), &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x3, 0x33, 0x8, 'bridge_slave_0\x00', 'veth0\x00', 'lo\x00', 'ip6erspan0\x00', @dev={[], 0x26}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff], 0xae, 0x12e, 0x166, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0x2, 0x80000000, 0xbcbe, 0x8, 0x6}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xaf, 0xe5, {0x7}}}}], @snat={'snat\x00', 0x10, {{@multicast}}}}, {0x3, 0x6a, 0x7, 'gretap0\x00', 'geneve0\x00', 'veth0_macvtap\x00', 'team_slave_0\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0x136, 0x16e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz1\x00', 0x80000001}}}, @owner={{'owner\x00', 0x0, 0x18}, {{r2, r3, r4, r6, 0x4, 0x7}}}], [@arpreply={'arpreply\x00', 0x10, {{@random="584bb6431a7c", 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0x48, 0x1b, 'hsr0\x00', 'gretap0\x00', 'batadv0\x00', 'hsr0\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @link_local, [0x0, 0x7f], 0x9e, 0x10e, 0x146, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x6, 0x10, 0x7}}}], [@snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0x10, {{@multicast, 0xfffffffffffffffc}}}], @arpreply={'arpreply\x00', 0x10, {{@multicast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x5, 0x48, 0xf7, 'sit0\x00', 'macvlan1\x00', 'gretap0\x00', 'dummy0\x00', @remote, [0xff, 0x57d9da7533fee243], @multicast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xe6, 0x15e, 0x196, [@pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x2}}}, @ip={{'ip\x00', 0x0, 0x20}, {{@empty, @dev={0xac, 0x14, 0x14, 0x15}, 0xffffff00, 0x0, 0x8, 0x6c, 0x20, 0x28, 0x4e22, 0x4e20, 0x4e20, 0x4e23}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x8001, 0x2, 0x0, 0x0, "b80a5752b87c1183404f89b58ae90054c335f251ff84039aa29234c7a676a8bb8bc7a77423d9d2517c47043ca6d156f161d8db71c2b16de3cf7cc84f82e95941"}}}], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}]}, 0x6b8) 03:27:21 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xffffff8c, 0x0) 03:27:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x40000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x4000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x7000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:21 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfffffff6, 0x0) 03:27:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) r2 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x640, [0x20000440, 0x0, 0x0, 0x20000744, 0x200008ba], 0x0, &(0x7f0000000040), &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x3, 0x33, 0x8, 'bridge_slave_0\x00', 'veth0\x00', 'lo\x00', 'ip6erspan0\x00', @dev={[], 0x26}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff], 0xae, 0x12e, 0x166, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0x2, 0x80000000, 0xbcbe, 0x8, 0x6}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xaf, 0xe5, {0x7}}}}], @snat={'snat\x00', 0x10, {{@multicast}}}}, {0x3, 0x6a, 0x7, 'gretap0\x00', 'geneve0\x00', 'veth0_macvtap\x00', 'team_slave_0\x00', @remote, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xfe, 0x136, 0x16e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz1\x00', 0x80000001}}}, @owner={{'owner\x00', 0x0, 0x18}, {{r2, r3, r4, r6, 0x4, 0x7}}}], [@arpreply={'arpreply\x00', 0x10, {{@random="584bb6431a7c", 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0x48, 0x1b, 'hsr0\x00', 'gretap0\x00', 'batadv0\x00', 'hsr0\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @link_local, [0x0, 0x7f], 0x9e, 0x10e, 0x146, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x6, 0x10, 0x7}}}], [@snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0x10, {{@multicast, 0xfffffffffffffffc}}}], @arpreply={'arpreply\x00', 0x10, {{@multicast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x5, 0x48, 0xf7, 'sit0\x00', 'macvlan1\x00', 'gretap0\x00', 'dummy0\x00', @remote, [0xff, 0x57d9da7533fee243], @multicast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xe6, 0x15e, 0x196, [@pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x2}}}, @ip={{'ip\x00', 0x0, 0x20}, {{@empty, @dev={0xac, 0x14, 0x14, 0x15}, 0xffffff00, 0x0, 0x8, 0x6c, 0x20, 0x28, 0x4e22, 0x4e20, 0x4e20, 0x4e23}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x8001, 0x2, 0x0, 0x0, "b80a5752b87c1183404f89b58ae90054c335f251ff84039aa29234c7a676a8bb8bc7a77423d9d2517c47043ca6d156f161d8db71c2b16de3cf7cc84f82e95941"}}}], @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}]}, 0x6b8) 03:27:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@hopopts={0x87, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x60000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x6000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xa000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:22 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfffffffe, 0x0) 03:27:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)) getgid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) 03:27:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x74000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x7200, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xe000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:22 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xedc000000000, 0x0) 03:27:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)) getgid() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 03:27:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:23 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf0ffffffffffff, 0x0) 03:27:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x9effffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x34000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)) getgid() socket(0x10, 0x2, 0x0) 03:27:23 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x100000000000000, 0x0) 03:27:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf0ffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x3f000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x400300, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:23 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x200000000000000, 0x0) 03:27:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)) getgid() 03:27:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x60000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf0ffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf5ffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:24 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x300000000000000, 0x0) 03:27:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000080)) 03:27:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x1000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfcffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:24 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x400000000000000, 0x0) 03:27:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x9effffff, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffff000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) geteuid() 03:27:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x2000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:25 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x500000000000000, 0x0) 03:27:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xdb000000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffff7f, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x264300, 0x0) 03:27:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffff9e, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x3000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:25 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x500000100000000, 0x0) 03:27:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf0ffffff, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffffff0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xf5ffffff, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x4000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x600000000000000, 0x0) 03:27:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffffff5, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x0, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:26 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:26 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffffffc, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x700000000000000, 0x0) 03:27:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xa000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xfcffffff, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:26 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x800000000000000, 0x0) 03:27:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xe000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xfffff000, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:27 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x900000000000000, 0x0) 03:27:27 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xffffff7f, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@hopopts={0x0, 0x0, [], [@enc_lim={0x4, 0x1, 0x40}]}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x3f000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:27 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:27 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xa00000000000000, 0x0) 03:27:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x2, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xffffff9e, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x40000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:27 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:27 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1000000000000000, 0x0) 03:27:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x3, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xfffffff0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x60000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x0) 03:27:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x4, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:28 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x2000000000000000, 0x0) 03:27:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xfffffff5, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:28 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x2010000000000000, 0x0) 03:27:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xa, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x0) 03:27:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xfffffffc, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x72000000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xe, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:29 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4800000000000000, 0x0) 03:27:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x0) 03:27:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0xffffffff, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x9effffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x60, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf0ffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:29 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x4c00000000000000, 0x0) 03:27:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0xf, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:27:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x74, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xf5ffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:30 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6800000000000000, 0x0) 03:27:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0xc0, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:27:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0xec0, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:30 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x6c00000000000000, 0x0) 03:27:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:27:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x300, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfcffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 03:27:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x33fe0, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xa00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:31 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7400000000000000, 0x0) 03:27:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffff000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 03:27:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffff7f, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xe00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 03:27:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x20000458, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:31 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x7a00000000000000, 0x0) 03:27:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffff9e, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000140)) 03:27:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 03:27:31 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x8cffffff00000000, 0x0) 03:27:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x7ffff000, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffffff0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 03:27:32 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf6ffffff00000000, 0x0) 03:27:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffffff5, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x4000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0xfffffdef, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:32 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xf9fdffff00000000, 0x0) 03:27:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000140)) 03:27:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 03:27:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x6000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xfffffffc, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x3, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:32 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfeffffff00000000, 0x0) 03:27:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x7400, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:33 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:33 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xff00000000000000, 0x0) 03:27:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x8, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 343.438403][T12369] FAULT_INJECTION: forcing a failure. [ 343.438403][T12369] name failslab, interval 1, probability 0, space 0, times 0 [ 343.499342][T12369] CPU: 1 PID: 12369 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 343.509257][T12369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.519313][T12369] Call Trace: [ 343.522623][T12369] dump_stack+0x188/0x20d [ 343.526980][T12369] should_fail.cold+0x5/0x14 [ 343.531586][T12369] ? lock_downgrade+0x7f0/0x7f0 [ 343.536509][T12369] ? setup_fault_attr+0x1e0/0x1e0 [ 343.541557][T12369] should_failslab+0x5/0xf [ 343.545992][T12369] kmem_cache_alloc_node+0x25c/0x760 [ 343.551308][T12369] __alloc_skb+0xba/0x5a0 [ 343.555658][T12369] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 343.561225][T12369] ? netlink_autobind.isra.0+0x21b/0x300 [ 343.566877][T12369] netlink_sendmsg+0x97b/0xe10 [ 343.571662][T12369] ? aa_af_perm+0x260/0x260 [ 343.576182][T12369] ? netlink_unicast+0x740/0x740 [ 343.581144][T12369] ? netlink_unicast+0x740/0x740 [ 343.586095][T12369] sock_sendmsg+0xcf/0x120 [ 343.590522][T12369] ____sys_sendmsg+0x6b9/0x7d0 [ 343.595304][T12369] ? kernel_sendmsg+0x50/0x50 [ 343.600066][T12369] ___sys_sendmsg+0x100/0x170 [ 343.604777][T12369] ? sendmsg_copy_msghdr+0x70/0x70 [ 343.609913][T12369] ? __fget_files+0x329/0x4f0 [ 343.614611][T12369] ? do_dup2+0x520/0x520 [ 343.618872][T12369] ? __fget_light+0x208/0x270 [ 343.623566][T12369] __sys_sendmsg+0xec/0x1b0 [ 343.628082][T12369] ? __sys_sendmsg_sock+0xb0/0xb0 [ 343.633115][T12369] ? vfs_write+0x15b/0x5c0 [ 343.637568][T12369] ? trace_hardirqs_off_caller+0x55/0x230 [ 343.643303][T12369] ? do_syscall_64+0x21/0x790 [ 343.648016][T12369] do_syscall_64+0xf6/0x790 [ 343.652534][T12369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.658431][T12369] RIP: 0033:0x45c679 [ 343.662334][T12369] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.681966][T12369] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 343.690387][T12369] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 343.698377][T12369] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 343.706351][T12369] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 343.714329][T12369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 343.722306][T12369] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000000 03:27:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000140)) 03:27:33 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xffffffff00000000, 0x0) 03:27:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0xb, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x34000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:33 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:33 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xfffffffffffff000, 0x0) 03:27:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x2, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 344.090744][T12394] FAULT_INJECTION: forcing a failure. [ 344.090744][T12394] name failslab, interval 1, probability 0, space 0, times 0 [ 344.150155][T12394] CPU: 1 PID: 12394 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 344.160058][T12394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.170115][T12394] Call Trace: [ 344.173424][T12394] dump_stack+0x188/0x20d [ 344.177798][T12394] should_fail.cold+0x5/0x14 [ 344.182404][T12394] ? lock_downgrade+0x7f0/0x7f0 [ 344.187261][T12394] ? setup_fault_attr+0x1e0/0x1e0 [ 344.192318][T12394] should_failslab+0x5/0xf [ 344.196754][T12394] kmem_cache_alloc_node_trace+0x27c/0x790 [ 344.202566][T12394] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 344.208570][T12394] __kmalloc_node_track_caller+0x38/0x60 [ 344.214218][T12394] __kmalloc_reserve.isra.0+0x39/0xe0 [ 344.219604][T12394] __alloc_skb+0xef/0x5a0 [ 344.223942][T12394] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 344.229502][T12394] ? netlink_autobind.isra.0+0x21b/0x300 [ 344.235142][T12394] netlink_sendmsg+0x97b/0xe10 [ 344.239940][T12394] ? aa_af_perm+0x260/0x260 [ 344.244448][T12394] ? netlink_unicast+0x740/0x740 [ 344.249459][T12394] ? netlink_unicast+0x740/0x740 [ 344.254411][T12394] sock_sendmsg+0xcf/0x120 [ 344.258835][T12394] ____sys_sendmsg+0x6b9/0x7d0 [ 344.263610][T12394] ? kernel_sendmsg+0x50/0x50 [ 344.268402][T12394] ___sys_sendmsg+0x100/0x170 [ 344.273089][T12394] ? sendmsg_copy_msghdr+0x70/0x70 [ 344.278224][T12394] ? __fget_files+0x329/0x4f0 [ 344.282927][T12394] ? do_dup2+0x520/0x520 [ 344.287227][T12394] ? __fget_light+0x208/0x270 [ 344.291922][T12394] __sys_sendmsg+0xec/0x1b0 [ 344.296437][T12394] ? __sys_sendmsg_sock+0xb0/0xb0 [ 344.301467][T12394] ? vfs_write+0x15b/0x5c0 [ 344.305908][T12394] ? trace_hardirqs_off_caller+0x55/0x230 [ 344.311638][T12394] ? do_syscall_64+0x21/0x790 [ 344.316337][T12394] do_syscall_64+0xf6/0x790 [ 344.320863][T12394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.326762][T12394] RIP: 0033:0x45c679 [ 344.330666][T12394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:27:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x3, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:34 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x101, 0x6, &(0x7f0000001540)=[{&(0x7f0000000200)="2b2a87fff87b86b6c0f614b035a4a41df483907eef9512423b48322042a15f8c372abe3e04a965e9c7b6f9fa950862ab4ed98a75e86873d72fd9738b150da428062e47982bf7811759fbdcb241bd253c9c054fabcfdab3bbd0b8a2633bbb4b13aab8948ad43450320b32c7ad81544c0366ac3fd4aebb708407ac23aae2594549a3a3", 0x82, 0x3ff}, {&(0x7f00000002c0)="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", 0x1000, 0x9}, {&(0x7f00000012c0)="728ab8ce00dd5328330f6532c0ed7b0b4fc9b0fa9acd12bf69a8870238913f7ed4ecb3498118fcff2a0f9a2ee09bd66e1075d92d7acc7c1a1c1a3e749d09eeeefcc780d28e31e660047d2cc4d42e032bf703d259ae86b70ffe1422d562dfeba2343b2ac419b3284962398a04121cd4f90b3ddb2c6d9a7483f406b8b0e404efc583af3c063dc0ef6bf9709e845a8976f29be342c11a917eef83b7e1328163af95432c195a1d9163731201f17e5059a1368501e4895a62da328a5e8613da7bfa8afa0c37dc30b937fe08256c3358beff0af4a1f0b6ec9bc0e0cbb5e9e41254843e0962d89362ab740dc5e0", 0xea, 0xe9}, {&(0x7f0000000100)="93503e32f6f7109744228d393c31d29e3a81b11c9ea8dc3cabacec62279d5a891450a9d8dda75376175169d9db70d7b40184375463d04388a17fb240d8ae736f0540409e56ad83ee7fba39e40f556a7791607dd4a71e481435c44379518de919ab701b4be8e4a417539d463160a2d81ee6fdd79e669be3f4b861e6b106aea1ec", 0x80, 0x200}, {&(0x7f00000013c0)="61c25f39fb4ba9b464162dfebfc6ae9d702c9d27698bd0b3ce057cb25bcb22d675a72c4919c95787af7b970b490d8c6f0d8860cfb0ca295dc9bf336f82ea6b692dcd2e219a0bc2cb0fe1e84c18ede0351562528c576045bca5ef1f43f7f49d998bb56e0bd8230b401604ca1f53b1068ab2c88f6107e6348d271f84427a1a8bc7cc058ef2cf95fbbd402c49e3bbe8e37561c0bda1ba20a01c495741dc4fdf4373099777feb0a24b015baf24b3ce813e6c", 0xb0, 0x6}, {&(0x7f0000001480)="d25dbabe6fd8e1ae7e80c097392d1adaf4da4aa884de4e39d1daff1191a97dc8f4eae14c574829b22acffd2eecdc46b81989c3447ff84ad7d7401852802953d2b8b30f97070f22e52d49a16586f261eb6e227d910f8bd27c4b4b38316faed4792381e1304919fe3b4ca75e1b9aeee95d5fe4b465802f8790f70579d2234ceb23060d668b95206ce3ef4ff82a940bda8f4211f10896a80def7d8502c63a5e75382f668465dc", 0xa5, 0x410}], 0x100000, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="000000000000001300000000"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xc4080, 0x0) 03:27:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x4, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x10, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 344.350307][T12394] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.358725][T12394] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 344.366710][T12394] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 344.374686][T12394] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 344.382663][T12394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 344.390638][T12394] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000001 03:27:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x400300, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:34 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/fEv/nullb0\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x41, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x7, 0x8, &(0x7f00000018c0)=[{&(0x7f0000000300)="747ffe5125e166791dfd7c3009a29c195aee07af6d8ce26fb8a4f8c31a6355c6ba53147509140e2b3ffdce5b1b1b36f104e3dc5662776256f3a60934c896c406ec1a053250d8749837b2b5ec3b40a8755ae55f320458c28358994a14ba577563992df1fd1dcd96ac36f4024cc489944239741f60", 0x74, 0x1}, {&(0x7f0000000500)="3e8739e7d50bae51ead2f9d1cae78f7a23b8ace67156bb5760f135c0d7520ce20c5aa91959b692d4988656286983a0a857c51102088cf891d419035ae073841e497526a03255c90aee1464b1bb0fea747e71ec258f8e5c93fabd1c7aea", 0x5d, 0x9}, {&(0x7f00000003c0)="4bf29e55d22378690c0336a32c0fb5a0c8e940a7bb7af230", 0x18, 0x9}, {&(0x7f0000000580)="cc3b53162cdbf5676a61c8fbe0de98b567b087e3ddbf983f6c6a37f4e93740b2d593d6d0ce011b1b55892c9758fbd58aacab4d1c1937b11442f705ec18e79d357a525f69b2d9d059be7aecb4dce8743c430718884ce6a4c5e3febc3e0caf273e3f7b81078b341829acf8a07a34cd6cd393b58d7a5101fcc2e8fa226d46c06d8113b8b8afd1d8bf75a5d98a6dbe61a1068e24ce7ab9d9f89026f3d7eac5a3a6db85ec434e15df4a868ed2ec4d4401fdca7fbcb7527bf502e13d06a497bb9fb6f64149dca3009b8af9fcc9e004db2c62968befff14da491271e062d29197afd262201900da742437", 0xe7, 0xb}, {&(0x7f0000000680)="0c5a3e81c8977f1a07a2ff53badea188ac172b7a3f7fd3ebdcdf22480a867a2b604a701f7b0ddf870db0abb482dffff949f4bdbc2ba0949832469b8a1d7f27162aacac4cfe081bbe22365bfae677caef956bf0b08f15eed32e5fed38fc997352230482f04ba7c396def219c4f27dd379b0b88616d972c80a3f00fc386f1551c3579a6989b7f8c1fb98659c983d4f31c1994d08a2f05b150aed27f8f0c862dba472179b9505335022cc987f93a287f7", 0xaf, 0x3f}, {&(0x7f0000000740)="285da58dd601e34f50dfd2a38019380d0ae66b3662fe59722d19e9a95098c3988d74faa7e380284b387abefb04dbe4c446f60f3e426365496c969d51ffac42e33bc7f24db44f5cb9d477d4573b665af73cf88e9db5e3086b09c2ed121a4eeda8848b42a8ab80efa3903810bd4f", 0x6d, 0x8}, {&(0x7f00000007c0)="917fad1a5eb5137a0e8f7191431d9a2032f4cc2489d85150b7e8bd0f82672aaeff688b3f611c4a011f218084cb266cfe26f52d6bb77fac976b0a071f0cf498c0ef47813f8d771aaecb400e2ef8a6edfaa38b333b2a389b64d671b1347577f4e570b0c827562d6b388ad2131684c4fdf59413d9de6de76a22daa16f5702f31310d8669856f6d2814e6ed68d0f9cb94d5c7b17c33b6e25038bbb51cf946ce49cb23cfd3f23cad2e75ed79842e505aa60a004ced2ec27ba933baa4c5aab93afe1406751013c03f1298fd4c3518a9dd064ce9fe469f46e3a10572af83d69d613b2b7f05b2ae2a618c5ea3786ece9ca2846d39fb2ad8728c01568071c302bae2823fe47627631ed6cdb1058da527ff7ac543f6df316380a5dcaeec4210052f415ae31d00456ec3d89b2c675ee4d63913e0fb20c521798999f9e13999e3c8827ca7a27dcc77ed982e3faeb173ff6e4ff2f3ca3476972e289fe9795bbabc81cdea35a6fd9a2857c2fe7f5c6046a0ae47a1001126597c7f2d4037a6940a691364de0bfe46d5e026f495e98fa37c8759db7ef2c10aa4bb9bb5a79c3ccf6326c6c01b67e3fda4f9173f3f53bdcfe835c0f95681d0cc88ec197bd345b9e569894db4aa2429eef35906b39305c8396c05647d38ba0aaa343f674549f862fc325e51e221d640755974a766fae0ebd61dc6565c77ca088b9d4aa7bc178bb45036f93f6d0355ea8d2f825dba0126a6501cab5bd9fa8d0067f70adaeabab68dfec3d9e997607eb97a2d23d83cea8aec99a07053c19e66363812cbd2a6412e1ed2ccfe6895b20dbc59614be215b87b2b8628647c0146a7326a7cc6b0e1292a049449a6dc2346370ce23f484d1989d78a6242d3d0b3979c48d64a5c70e548137acaec27a8d4ba4bf017af1d6290e1e04998ac02b5c5cbadee5da9acabaeef6f503043ee882914fb01b572b8b473374278f0d04606513efb021cb0d8abbac8e59124dafb8d1868a4e8dbd91b517c4296ce5716aaf19a04898d6b2c914fe53a35236250517593be79b79113b99ed46d5edf505513482d76f79df1e18d2b89c7239c90f3171d149642fdc86f8f8744da9d692de465599a031d66377a4e44d95344d14b15b76496d81e9375880acb1a0d53b3da33dc73c6adbd68a7b0cc7acbedf00d9c1d771dc4fcc9e53beac0e64432afc187319b9b0b1a2f47b78449ce7e270efbad592b2f6e93769bb881efd587beea3f8249619646f88a2ddc23a2c8e2f628b3dc7257f3121e7ab9492ba9204980747ad9bfc250ccb5b57cb53928970c9ac329d38c6485227d6e1bbad58744c9de8e10d42fa23e7b1cdf3f885ca0d1445ca0ae33ad6203f086e5f89c4508abaa2a1545d7d589433e2879cb3258583891a3f92ad8c02a1fcf95f2c0535b5385d5ceb9e8aff9aa2ce4967f745c4caf6f36609a2e32772be363855af532faf8cc5add84f374d6b41063a6671f86a478fb6a9a8482d2b73219f3ce3cfc59907101e7ef2b7e3d408a34ad40d2c8c7b4ef400502605ff62885be95acee22b21c683375acc9d62b5273d3959f05457286827d0dcfe700088071089e6104ac7739e1f3df94cd6f0858a50529eb93ee82b36cda903e4ce8f35c2308f6c5a1f45b000bdfb37dd2b2644cc629918844a2cc14fe5f7177af4747d8185812da720eee012b3e4f87b6594247f865cbd9afc8987196687df3e3225a7afbd574b219b16ed099ba6b2bd712f1078e15ab9cdfbc32f8b5fdf3bda4d0320f7e5dfd8a18917a4fcae92a81fd81c6db75ffdb6d84506a0006f275352efa2c9e81d331ef9824e714f112a688d98afe888d7d125e9777b61ba6b395407ea9de7053cc79188f42f89205f54df168eb998da8cc2e8d4ba828ead0663c2d129dce8ec62de3170873dc8143b3bd63e1c0a50970b3359d4ae0144f47f1faa9496ac9426f8869d88cddb5020dd757ab3914e46dda1b1babc74c26b58ebb5714660884cfcd4bdd488f09668d8e76d7e3f2171cdfdff9b6b42e49b5177ac7bda37b6edfeb5a8b265b6d809d8d0b328211393688d36323723212299337df99555e8353a26d7756f94265585a78571e175833656bcc1142ce0eefe5e511a98ca083dfb395590a9034264618d7dc290f7e68387e9ff4503b03b306dddaa2e6c773fdabd11e3b60a86d49893f35e154c0d10355f329decd0ce0112f207197f6456f57271d38509c7e03f84723bcbec740ddaa96567f57c391f4f2e3c19b40ca97a9371c31bbc39d6852214d9f037c70a624f605b29778bbbab4529b64b07bf08a1457822437d0ecd43890928ddb1d1b92df7facce317d52d32ed0f803823dfd7861ec2e1bcc2687ddd948a810dca7c7669a8282a3591ef46a8cb00156be55dd93894843e84fa28e65a694d6e0662d5af074877996c143bee01a3ba0e007100a0902791131c709ec018486ee8963752baf2e22cd8bbc476291429d20e81bc742e75c543136c19ed5180860033af5e0e15cfa833633f05b729c2878c9123dd63b9a772dbf8046a85c730575c1f4eef5d1365f3a46fe2916a13c720d1221b0cc59c2c4b435a07e25a431bf09d28df11b425161466a1824b676381ad3a47a2c72acbb0e728ac855eda5b11c0d945e115629f519a6c8e31d21b378d5d671b79f0a6ef5eb43f02241194bfd9a5c878289b19e9712fde280bcc54dff22c008489981c0a0e34e197b4e9549dbebbe23e0a588234b69cac7c79964e2a65b14f0c10bad0df383ad1051321f3ce7819523ddd802098af77b08f8e1b055c402e184fb2fae1f45a9bde232d920dc28c8a70965e214f751b44b8e05af9114f7ad4bc3054ee22082c3942b425b79834fd9d1a697759a4e2adb5e7b4e0691988bcc36b9b85270a8af0075f2162f5ae6a8f7860956af3918bdaba0544863b9dbcea5279f552cbe8f3694d29de96b907daa8ee7657c9a07ea712b0829a17c8f6862409effb7af9a97f2d540f9ff612f56aa5e50fc8c5645722b1346f11accb628a96422eb6ef0f82dade2c577e72e8dda10c25f15a798e3db300931471a011e163c1eb97d091a7006fdee3a0b1ad1493341f779f3c4f750c2ae5b799498c302373edecf8fbf31702fdc82860c838b36dd44c7a8a3f43d8c5332f9896fb7c9edc9e14a1d09e449c89c2dd2899f40c9de849e54956f60184b40eec5467c23b02bf40b09c0ba8b93ef9d593dd2674a3c277efe30556c9fbd0648cb05564784515fd41fffdb3864ed433dc7631f36bae095073f20a3172fd5ad611d367a0cb359de4af0d498761076a9422b36cce21b424fbb505593b0f2ca586dbd59526e4a30de31c037afcf7133ecef36d55c3eeb40419770d243d9e5a890e792861b84fa5ae3cb7f2327732a5291dfe948d2c747c329292e1f3617ca54d22e7cd829b390fdcfba5c2de470c673f2b6afe43ee1b53fa55fd545e1476e146cd1784458523fd157815e25abf42037a41bd120e641fa7678b3434c632d91056b6539735b7919a54eafb31b495042feac724e86e9bba0d105eb643dc19f83a5d86faf2bb50a4c0607ddb76e6cee08e1e8fc243cdeb1bac8fa07efb92da15013b73b07240599f0bf1eddda033116784ccb09cc7825a779a39e3765b513b91066f6de35327c08287b46590a20a59e46ddf4f30adb28bce5e435f703a7ddfe58356dfaf666b4d281bc673768ac1898ffd4fadb31518494b9b3c41e1b91de47450b7217ba8540aa358cd8dd53a79bfc3c56413fe8088831a445319cb3052c8e12536b5f8b99ad1b2b019ee7de55be8b3488e418c34f66131f317b6a393383511ace5e63d1a80de06e44a817907435a8e708bc5fb6b94e57c35f27f1efaf12285a65a9df3f1811f10ea09f12277627c22e993309480eeb32a7977f6f721220f0f936c9ec7b7fce03bccef731fa2dbacaba03acd65dd926dfeb954959c5216221e569b487479dd17784ccf028d6bf48dce2c03383bd9d308925379c539572b72553f4affe0355d7ed71677d7f8172bf07f2e8f324b0bed1bcc1f6ffd4bdaf8015b6821ee3b851575c6d11e83100d452699247c2c738c8cdff0eb93b5577be18b855f62dc5e087a918f60997e41df6da33249849498ad9cc0b9ada9417fe06bebbd1d9c76e6662153b9b729032615b7b4d04bb958686588bc86d7abcff4d6206b1558cf6a17215ada043ed633ba1e902f49507ad95393dd6f920bfec18f9d45e2b4177f04ee5d23e38a2b72a972507124c7aec45832801ef69c437d9cd315d8df21700c7afd171b28c306751cb8d5692e764ebed79c0ba618333621ecc77eb7528ef16e5252aa63b66a13316978f61258269897585a82defcbedfd70437539ecd9e24e257cf719164a3e63e74f7eeed2fa13f076ee74ed0188be7752d1bd431242addb48924075c92dc2d9d4b7431a8d98f79f7e4310870312155719d7ea2e85b27d4972c9fb4e62cebe2d870568a8c48105110fea3e063f22bc84410d9921afeaaa2b667e7bf6e1e476d133ae38a3a4f599d6ccd2399f1f0b2fc179a3ea4f59c37272b68bfd3b2b1d74d4a2159b560af69640682802f6ba6764180b7edd70204800071f682a89d81c86098d4fb085d08a8192b7e8576e03e28de443ddac5195349fd63bc12cc52d1a6b532fa812ffe8b27b0b298aff4784d1bdabd19b0f10b7bdb5b35fcf11de9adfd7db89af40bd846c219b669bee68fdfec5c934f64691997fe81368a4adca2efe6c8d1fa7b99cfc0b7325577d7be24bbde1bdd359519fdfdc30edece26e42e0ce47a5b94d0f681dcc465ab1967b7745a4b30c33a9d8a54c62f2ac16c5e0f1fe97df158fe08722fb6872b0dd20672bc797f64a712c881fde2875a50f034015f3a09a2a03c2705839a2d39d40272d5db3b3eb66b5e14dc8b95b87b8ba752390eb8c1d07f27a783ca8ec0b4539ff54bb3a39c6a03a29c3a41e50fcb41648afac1fa0610bfc1975a7a354d04940aa41e68562f71a217b467f41a25458f12e4a7ca99f551e16a539179e99e0356cc219a89d9a8528426d1a19a13e4f61ac9b90ace7d8cf20e7737402154cb5635888fcf8d7cb8fb3e473739ee8d5e411ea5c6e2ca1a0b5e0605a0d68ee045c2da680b69d33f326465a5105479f131c3ad528ff3e6e8c15338950bff48734c82e57bdaccfd624205672313874810cd32b7fdc4ca6ddf6e7d9a3b31b0e27b5fc7831cef3c0bdec955f58f52a640ceda6a83dd4397d65f5fbdd99e00b6b19f228ec8383f041aea227ed0bb115929ad77e2c3f809ce67b869db02df90bdb51a0eb05fbdb0c26a2f0e326dfeca8fdff26357e1f353dc789e8574db592d298251361fcae545eeececc34b209954b15924d7046b7cc9123dafc442ac86a2eeb74db89212b3abd6977c950deb200e482eb111ca6c159fd44b6126f374dedb31510378ea799af924b045be0caafb4e3a44a1553d4cb7302d5156dc50cf3a4f954196a689bfa41ba720f3f84f9ce1cbba29d7dea97fec355e3a7af5645ee7d40fe0a0a1e35c5c47074002c37f6de886167a23cf817ed798c379fadffaa05c2febcd0b29849c76e353aa593c01cdfea54a47e1fc9652cef9922bf2a79a4f71292167f7002fe25b9c6852b57a3df36fb8fdb375ad005dee1c6d10fe657e13a0b29236ee1322fb2baf7e29b3e92c15a069e584e545d01cbeccd0ace72166317670fa45671e712ae7650f55f7032d87a3db2a0c0aab870ffee6a428f58e6387489ed74b875eac06de52a54d7b662fa1c1622d8370c8433a64edba8f584d153592a3d9d7ef65646961615278e7cc299610181d1660ceba", 0x1000, 0x1000}, {&(0x7f00000017c0)="4156c97092a6ea47f1d6998380c87f6883a244b067db369ca44be5411644dab9ef7244a4c8db3475a186be37e3cc7a8a2f896f22c497bbac15671584cdf4d1f6a528a86b4679040a0ea6264031f61e41d8951d782c4c482a6358ad6db5b743076ed4332a8da4d6fe5d37ccd15d560d4060c5a21398bbad82714e83511409b3d2ff6e0171fff7937b38ba1ad05304cda22628faa30420cb20c0f51c5e9730836846504c60e4acc9ec0cfad7af753c16f6841cb1c820d2a14e6e7e3c6fb5b5dccc87598cc92e9974bf4e02008f4a74", 0xce, 0x10000}], 0x2080800, &(0x7f0000001a00)={[{@barrier='barrier'}, {@logbufs={'logbufs', 0x3d, 0x5}}], [{@fowner_gt={'fowner>', r5}}, {@obj_role={'obj_role', 0x3d, 'wlan0ppp0,'}}, {@hash='hash'}, {@obj_user={'obj_user', 0x3d, '/dev/hwrng\x00'}}]}) fsconfig$FSCONFIG_SET_PATH_EMPTY(r4, 0x4, &(0x7f0000000000)='cgroup\x00', &(0x7f00000000c0)='./file0\x00', r2) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x7, 0x18, &(0x7f0000000200)="762d3919a307e0d2cd4e1ecf1a0bbf446272fbb6221a1df5"}) 03:27:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xa, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:34 executing program 0 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x14, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xe, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 345.029665][T12438] FAULT_INJECTION: forcing a failure. [ 345.029665][T12438] name failslab, interval 1, probability 0, space 0, times 0 [ 345.064535][T12438] CPU: 0 PID: 12438 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 03:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 345.074476][T12438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.084532][T12438] Call Trace: [ 345.087861][T12438] dump_stack+0x188/0x20d [ 345.092357][T12438] should_fail.cold+0x5/0x14 [ 345.096963][T12438] ? setup_fault_attr+0x1e0/0x1e0 [ 345.102021][T12438] ? mark_held_locks+0xe0/0xe0 [ 345.106796][T12438] should_failslab+0x5/0xf [ 345.111226][T12438] kmem_cache_alloc+0x44/0x730 [ 345.116003][T12438] ? lock_acquire+0x197/0x420 [ 345.120694][T12438] skb_clone+0x14d/0x3c0 [ 345.124952][T12438] netlink_deliver_tap+0x91c/0xb50 03:27:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x8, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 345.130101][T12438] netlink_unicast+0x5e9/0x740 [ 345.134892][T12438] ? netlink_attachskb+0x810/0x810 [ 345.140012][T12438] ? _copy_from_iter_full+0x25c/0x870 [ 345.145407][T12438] ? __phys_addr_symbol+0x2c/0x70 [ 345.150453][T12438] ? __check_object_size+0x171/0x437 [ 345.155762][T12438] netlink_sendmsg+0x882/0xe10 [ 345.160545][T12438] ? aa_af_perm+0x260/0x260 [ 345.165034][T12438] ? netlink_unicast+0x740/0x740 [ 345.169981][T12438] ? netlink_unicast+0x740/0x740 [ 345.174931][T12438] sock_sendmsg+0xcf/0x120 [ 345.179345][T12438] ____sys_sendmsg+0x6b9/0x7d0 [ 345.184138][T12438] ? kernel_sendmsg+0x50/0x50 [ 345.188845][T12438] ___sys_sendmsg+0x100/0x170 [ 345.193526][T12438] ? sendmsg_copy_msghdr+0x70/0x70 [ 345.198643][T12438] ? __fget_files+0x329/0x4f0 [ 345.203323][T12438] ? do_dup2+0x520/0x520 [ 345.207581][T12438] ? __fget_light+0x208/0x270 [ 345.212283][T12438] __sys_sendmsg+0xec/0x1b0 [ 345.216797][T12438] ? __sys_sendmsg_sock+0xb0/0xb0 [ 345.221860][T12438] ? vfs_write+0x15b/0x5c0 [ 345.226269][T12438] ? trace_hardirqs_off_caller+0x55/0x230 [ 345.231985][T12438] ? do_syscall_64+0x21/0x790 [ 345.236661][T12438] do_syscall_64+0xf6/0x790 [ 345.241152][T12438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.247040][T12438] RIP: 0033:0x45c679 [ 345.250931][T12438] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.270536][T12438] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 345.278938][T12438] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 345.286889][T12438] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 345.294875][T12438] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.302872][T12438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 345.310875][T12438] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000002 03:27:35 executing program 0 (fault-call:1 fault-nth:3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:35 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000300)=""/63) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f00000000c0)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) lstat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)) 03:27:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 345.541904][T12457] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 345.567404][T12459] FAULT_INJECTION: forcing a failure. [ 345.567404][T12459] name failslab, interval 1, probability 0, space 0, times 0 [ 345.621858][T12460] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 345.637885][T12459] CPU: 0 PID: 12459 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 345.647836][T12459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.657912][T12459] Call Trace: [ 345.661222][T12459] dump_stack+0x188/0x20d [ 345.665578][T12459] should_fail.cold+0x5/0x14 [ 345.670198][T12459] ? setup_fault_attr+0x1e0/0x1e0 [ 345.675256][T12459] should_failslab+0x5/0xf [ 345.679694][T12459] kmem_cache_alloc_node+0x25c/0x760 [ 345.685016][T12459] ? mutex_trylock+0x2c0/0x2c0 [ 345.689823][T12459] __alloc_skb+0xba/0x5a0 [ 345.694278][T12459] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 345.699852][T12459] ? lock_downgrade+0x7f0/0x7f0 [ 345.704738][T12459] netlink_dump+0x6df/0xf30 [ 345.709274][T12459] ? __netlink_sendskb+0xb0/0xb0 [ 345.714280][T12459] ? __mutex_unlock_slowpath+0xe2/0x660 [ 345.719872][T12459] __netlink_dump_start+0x648/0x910 [ 345.725192][T12459] ? ctnetlink_alloc_filter+0x220/0x220 [ 345.730774][T12459] ctnetlink_get_conntrack+0x52c/0x660 [ 345.736260][T12459] ? consume_skb+0xfb/0x400 [ 345.740789][T12459] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 345.746263][T12459] ? mutex_trylock+0x2c0/0x2c0 [ 345.751046][T12459] ? find_held_lock+0x2d/0x110 [ 345.755839][T12459] ? ctnetlink_alloc_filter+0x220/0x220 [ 345.761418][T12459] ? ctnetlink_dump_dying+0x30/0x30 [ 345.766637][T12459] ? ctnetlink_dump_helpinfo+0x390/0x390 [ 345.772304][T12459] ? lock_downgrade+0x7f0/0x7f0 [ 345.777172][T12459] ? nla_memcpy+0xa0/0xa0 [ 345.781542][T12459] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 345.787025][T12459] nfnetlink_rcv_msg+0xc83/0xf30 [ 345.792011][T12459] ? nfnetlink_bind+0x2b0/0x2b0 [ 345.796927][T12459] ? __local_bh_enable_ip+0x159/0x270 [ 345.802344][T12459] ? lockdep_hardirqs_on+0x417/0x5d0 [ 345.807657][T12459] ? __dev_queue_xmit+0x174a/0x3070 [ 345.812878][T12459] ? __local_bh_enable_ip+0x159/0x270 [ 345.818268][T12459] ? __dev_queue_xmit+0xbf2/0x3070 [ 345.823415][T12459] netlink_rcv_skb+0x15a/0x410 [ 345.828199][T12459] ? nfnetlink_bind+0x2b0/0x2b0 [ 345.833068][T12459] ? netlink_ack+0xa80/0xa80 [ 345.837687][T12459] ? ns_capable_common+0xe2/0x100 [ 345.842730][T12459] nfnetlink_rcv+0x1ac/0x420 [ 345.847328][T12459] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 345.852810][T12459] netlink_unicast+0x537/0x740 [ 345.857599][T12459] ? netlink_attachskb+0x810/0x810 [ 345.862717][T12459] ? _copy_from_iter_full+0x25c/0x870 [ 345.868098][T12459] ? __phys_addr_symbol+0x2c/0x70 [ 345.873229][T12459] ? __check_object_size+0x171/0x437 [ 345.878533][T12459] netlink_sendmsg+0x882/0xe10 [ 345.883316][T12459] ? aa_af_perm+0x260/0x260 [ 345.887832][T12459] ? netlink_unicast+0x740/0x740 [ 345.892792][T12459] ? netlink_unicast+0x740/0x740 [ 345.897744][T12459] sock_sendmsg+0xcf/0x120 [ 345.902172][T12459] ____sys_sendmsg+0x6b9/0x7d0 [ 345.906948][T12459] ? kernel_sendmsg+0x50/0x50 [ 345.911657][T12459] ___sys_sendmsg+0x100/0x170 [ 345.916344][T12459] ? sendmsg_copy_msghdr+0x70/0x70 03:27:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x1000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x60, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:35 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x214000, 0x0) [ 345.921485][T12459] ? __fget_files+0x329/0x4f0 [ 345.926170][T12459] ? do_dup2+0x520/0x520 [ 345.930427][T12459] ? __fget_light+0x208/0x270 [ 345.935105][T12459] __sys_sendmsg+0xec/0x1b0 [ 345.939624][T12459] ? __sys_sendmsg_sock+0xb0/0xb0 [ 345.944636][T12459] ? vfs_write+0x15b/0x5c0 [ 345.949054][T12459] ? trace_hardirqs_off_caller+0x55/0x230 [ 345.954775][T12459] ? do_syscall_64+0x21/0x790 [ 345.959460][T12459] do_syscall_64+0xf6/0x790 [ 345.963968][T12459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.969850][T12459] RIP: 0033:0x45c679 [ 345.973755][T12459] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.993360][T12459] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.001788][T12459] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 346.010573][T12459] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 03:27:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x9, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 346.018564][T12459] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 346.026549][T12459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 346.034520][T12459] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000003 03:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x2000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x72, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0xb, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x3000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:35 executing program 0 (fault-call:1 fault-nth:4): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:36 executing program 3: mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x80, 0x2, &(0x7f0000000140)=[{&(0x7f0000000200)="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", 0x1000, 0xccb}, {&(0x7f00000000c0)="ec62161b3be1b2bac1d01537605e9c848cd2d01a831550cb6842dfe679b0417c8d3a6d0c2ef7e778db602c43d7b937db1e74dcf4db946f0c47a8113b516457bcfa3b3999aabea6bab0da0f2895212a7919f9332459452c5af392012b6a1c2d4b4f7f6d23c64e783b2b31937364e67f861c9d1a", 0x73, 0x5}], 0x802000, &(0x7f0000001200)={[{@noquota='noquota'}, {@quota='quota'}, {@resize_size={'resize', 0x3d, 0x1ff}}, {@resize='resize'}, {@resize='resize'}, {@resize='resize'}, {@uid={'uid', 0x3d, r1}}], [{@fsmagic={'fsmagic'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@audit='audit'}]}) 03:27:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x4000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 346.386695][T12497] FAULT_INJECTION: forcing a failure. [ 346.386695][T12497] name failslab, interval 1, probability 0, space 0, times 0 [ 346.447009][T12497] CPU: 1 PID: 12497 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 346.456956][T12497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.467026][T12497] Call Trace: [ 346.470349][T12497] dump_stack+0x188/0x20d [ 346.474712][T12497] should_fail.cold+0x5/0x14 [ 346.479334][T12497] ? setup_fault_attr+0x1e0/0x1e0 [ 346.484387][T12497] should_failslab+0x5/0xf [ 346.488827][T12497] kmem_cache_alloc_node_trace+0x27c/0x790 [ 346.494646][T12497] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 346.500666][T12497] __kmalloc_node_track_caller+0x38/0x60 [ 346.506319][T12497] __kmalloc_reserve.isra.0+0x39/0xe0 [ 346.511707][T12497] __alloc_skb+0xef/0x5a0 [ 346.516060][T12497] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 346.521621][T12497] ? lock_downgrade+0x7f0/0x7f0 [ 346.526508][T12497] netlink_dump+0x6df/0xf30 [ 346.531030][T12497] ? __netlink_sendskb+0xb0/0xb0 [ 346.536002][T12497] ? __mutex_unlock_slowpath+0xe2/0x660 [ 346.541581][T12497] __netlink_dump_start+0x648/0x910 [ 346.546817][T12497] ? ctnetlink_alloc_filter+0x220/0x220 [ 346.552385][T12497] ctnetlink_get_conntrack+0x52c/0x660 [ 346.557864][T12497] ? consume_skb+0xfb/0x400 [ 346.562401][T12497] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 346.567863][T12497] ? mutex_trylock+0x2c0/0x2c0 [ 346.572634][T12497] ? find_held_lock+0x2d/0x110 [ 346.577412][T12497] ? ctnetlink_alloc_filter+0x220/0x220 [ 346.582963][T12497] ? ctnetlink_dump_dying+0x30/0x30 [ 346.588175][T12497] ? ctnetlink_dump_helpinfo+0x390/0x390 [ 346.593838][T12497] ? lock_downgrade+0x7f0/0x7f0 [ 346.598692][T12497] ? nla_memcpy+0xa0/0xa0 [ 346.603106][T12497] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 346.608566][T12497] nfnetlink_rcv_msg+0xc83/0xf30 [ 346.613533][T12497] ? nfnetlink_bind+0x2b0/0x2b0 [ 346.618439][T12497] ? __local_bh_enable_ip+0x159/0x270 [ 346.623828][T12497] ? lockdep_hardirqs_on+0x417/0x5d0 [ 346.629130][T12497] ? __dev_queue_xmit+0x174a/0x3070 [ 346.634379][T12497] ? __local_bh_enable_ip+0x159/0x270 [ 346.639783][T12497] ? __dev_queue_xmit+0xbf2/0x3070 [ 346.644921][T12497] netlink_rcv_skb+0x15a/0x410 [ 346.649694][T12497] ? nfnetlink_bind+0x2b0/0x2b0 [ 346.654556][T12497] ? netlink_ack+0xa80/0xa80 [ 346.659172][T12497] ? ns_capable_common+0xe2/0x100 [ 346.664216][T12497] nfnetlink_rcv+0x1ac/0x420 [ 346.668805][T12497] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 346.674313][T12497] netlink_unicast+0x537/0x740 [ 346.679101][T12497] ? netlink_attachskb+0x810/0x810 [ 346.684196][T12497] ? _copy_from_iter_full+0x25c/0x870 [ 346.689552][T12497] ? __phys_addr_symbol+0x2c/0x70 [ 346.694559][T12497] ? __check_object_size+0x171/0x437 [ 346.699845][T12497] netlink_sendmsg+0x882/0xe10 [ 346.704612][T12497] ? aa_af_perm+0x260/0x260 [ 346.709111][T12497] ? netlink_unicast+0x740/0x740 [ 346.714071][T12497] ? netlink_unicast+0x740/0x740 [ 346.719038][T12497] sock_sendmsg+0xcf/0x120 [ 346.723483][T12497] ____sys_sendmsg+0x6b9/0x7d0 [ 346.728235][T12497] ? kernel_sendmsg+0x50/0x50 [ 346.732927][T12497] ___sys_sendmsg+0x100/0x170 [ 346.737631][T12497] ? sendmsg_copy_msghdr+0x70/0x70 [ 346.742734][T12497] ? __fget_files+0x329/0x4f0 [ 346.747403][T12497] ? do_dup2+0x520/0x520 [ 346.751680][T12497] ? __fget_light+0x208/0x270 [ 346.760369][T12497] __sys_sendmsg+0xec/0x1b0 [ 346.764858][T12497] ? __sys_sendmsg_sock+0xb0/0xb0 [ 346.769866][T12497] ? vfs_write+0x15b/0x5c0 [ 346.774276][T12497] ? trace_hardirqs_off_caller+0x55/0x230 [ 346.779994][T12497] ? do_syscall_64+0x21/0x790 [ 346.784684][T12497] do_syscall_64+0xf6/0x790 [ 346.789245][T12497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.795147][T12497] RIP: 0033:0x45c679 [ 346.799027][T12497] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.818803][T12497] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.827210][T12497] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 346.835162][T12497] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 346.843138][T12497] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 346.851090][T12497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 346.859066][T12497] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000004 03:27:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xa000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x10, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) 03:27:36 executing program 0 (fault-call:1 fault-nth:5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:36 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:36 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cifs\x00', 0x0, 0x0) 03:27:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x300, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 347.141373][T12524] FAULT_INJECTION: forcing a failure. [ 347.141373][T12524] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.154650][T12524] CPU: 0 PID: 12524 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 347.164554][T12524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.174624][T12524] Call Trace: [ 347.177965][T12524] dump_stack+0x188/0x20d [ 347.182323][T12524] should_fail.cold+0x5/0x14 [ 347.186943][T12524] ? setup_fault_attr+0x1e0/0x1e0 [ 347.191999][T12524] ? __lock_acquire+0x18c3/0x5270 [ 347.197071][T12524] __alloc_pages_nodemask+0x17a/0x820 [ 347.202464][T12524] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.208546][T12524] ? __lock_acquire+0x18c3/0x5270 [ 347.213595][T12524] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 347.219349][T12524] ? find_held_lock+0x2d/0x110 [ 347.224165][T12524] cache_grow_begin+0x8c/0xc10 [ 347.228967][T12524] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 347.234459][T12524] kmem_cache_alloc_node_trace+0x6bd/0x790 [ 347.240307][T12524] __kmalloc_node_track_caller+0x38/0x60 [ 347.245977][T12524] __kmalloc_reserve.isra.0+0x39/0xe0 [ 347.251397][T12524] __alloc_skb+0xef/0x5a0 [ 347.255749][T12524] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 347.261319][T12524] ? lock_downgrade+0x7f0/0x7f0 [ 347.266204][T12524] netlink_dump+0x6df/0xf30 [ 347.270730][T12524] ? __netlink_sendskb+0xb0/0xb0 [ 347.275686][T12524] ? __mutex_unlock_slowpath+0xe2/0x660 [ 347.281366][T12524] __netlink_dump_start+0x648/0x910 03:27:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xa00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 347.286601][T12524] ? ctnetlink_alloc_filter+0x220/0x220 [ 347.293175][T12533] CIFS: Attempting to mount /dev/nullb0 [ 347.293606][T12524] ctnetlink_get_conntrack+0x52c/0x660 [ 347.305141][T12524] ? consume_skb+0xfb/0x400 [ 347.309669][T12524] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 347.315140][T12524] ? mutex_trylock+0x2c0/0x2c0 [ 347.319917][T12524] ? find_held_lock+0x2d/0x110 [ 347.324716][T12524] ? ctnetlink_alloc_filter+0x220/0x220 [ 347.331062][T12524] ? ctnetlink_dump_dying+0x30/0x30 [ 347.336307][T12524] ? ctnetlink_dump_helpinfo+0x390/0x390 03:27:37 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 347.342087][T12524] ? lock_downgrade+0x7f0/0x7f0 [ 347.347401][T12524] ? nla_memcpy+0xa0/0xa0 [ 347.351773][T12524] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 347.357345][T12524] nfnetlink_rcv_msg+0xc83/0xf30 [ 347.362332][T12524] ? nfnetlink_bind+0x2b0/0x2b0 [ 347.367237][T12524] ? __local_bh_enable_ip+0x159/0x270 [ 347.372626][T12524] ? lockdep_hardirqs_on+0x417/0x5d0 [ 347.377938][T12524] ? __dev_queue_xmit+0x174a/0x3070 [ 347.383148][T12524] ? __local_bh_enable_ip+0x159/0x270 [ 347.388564][T12524] ? __dev_queue_xmit+0xbf2/0x3070 [ 347.393788][T12524] netlink_rcv_skb+0x15a/0x410 [ 347.398575][T12524] ? nfnetlink_bind+0x2b0/0x2b0 [ 347.403620][T12524] ? netlink_ack+0xa80/0xa80 [ 347.408258][T12524] ? ns_capable_common+0xe2/0x100 [ 347.413555][T12524] nfnetlink_rcv+0x1ac/0x420 [ 347.418262][T12524] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 347.423760][T12524] netlink_unicast+0x537/0x740 [ 347.428552][T12524] ? netlink_attachskb+0x810/0x810 [ 347.433688][T12524] ? _copy_from_iter_full+0x25c/0x870 [ 347.439080][T12524] ? __phys_addr_symbol+0x2c/0x70 [ 347.444143][T12524] ? __check_object_size+0x171/0x437 [ 347.449452][T12524] netlink_sendmsg+0x882/0xe10 [ 347.454240][T12524] ? aa_af_perm+0x260/0x260 [ 347.458760][T12524] ? netlink_unicast+0x740/0x740 [ 347.463841][T12524] ? netlink_unicast+0x740/0x740 [ 347.468796][T12524] sock_sendmsg+0xcf/0x120 [ 347.473252][T12524] ____sys_sendmsg+0x6b9/0x7d0 [ 347.478059][T12524] ? kernel_sendmsg+0x50/0x50 [ 347.482809][T12524] ___sys_sendmsg+0x100/0x170 [ 347.487508][T12524] ? sendmsg_copy_msghdr+0x70/0x70 [ 347.492665][T12524] ? __fget_files+0x329/0x4f0 [ 347.497367][T12524] ? do_dup2+0x520/0x520 [ 347.501649][T12524] ? __fget_light+0x208/0x270 [ 347.506351][T12524] __sys_sendmsg+0xec/0x1b0 [ 347.510959][T12524] ? __sys_sendmsg_sock+0xb0/0xb0 [ 347.516022][T12524] ? vfs_write+0x15b/0x5c0 [ 347.520475][T12524] ? trace_hardirqs_off_caller+0x55/0x230 [ 347.526220][T12524] ? do_syscall_64+0x21/0x790 [ 347.530926][T12524] do_syscall_64+0xf6/0x790 [ 347.535498][T12524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.541409][T12524] RIP: 0033:0x45c679 [ 347.545315][T12524] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.565035][T12524] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 347.573465][T12524] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 347.581557][T12524] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 03:27:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xe00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) setsockopt$rose(r1, 0x104, 0x6, &(0x7f0000000000), 0x4) [ 347.589583][T12524] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 347.597600][T12524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 347.605592][T12524] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000005 03:27:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xe000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x14, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, 0x0) 03:27:37 executing program 0 (fault-call:1 fault-nth:6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:37 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="304a65602f6e3a9c123f21c1445bacb9772548ec22df7f7745437ceeafe6bfe27c33c52c043f33b1da1d7fb3dc0d7d0528a8cc8f98842d7f0ed5807998ea4bc147cfafaba5fcd3eb52d7d6d690c31ecf358c80aade0e1ae2cc6452c9e36419c97f789be645fbf664b47fb847bd04b91cf89c5ac82c5d84b2e77ee15d2c9fb6bb715cb76b8a0e5bfaaec81729c6c83f571ae438e6db3bf360a361aa9576abc638584566f611088d58d803adfe781e6fa5e99d6c4799d73ffc669d710cef1d05c859c8d895a5957f259062f455934281ebea0f2e3c8beda5a55553e212083822d7bc94b7341865c20200000000000000a31f383129cdb8bc403b68eb2c47f26c0634"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/44, 0x2c) 03:27:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x3f00, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x4000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x40000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:37 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x4}, [@alu={0x7, 0x1, 0x8, 0x4, 0x6, 0xfffffffffffffff4, 0x1}, @generic={0x4, 0x1, 0x5, 0x3, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffff01, 0x0, 0x0, 0x0, 0x32b}, @ldst={0x0, 0x1, 0x0, 0x3, 0x7, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x7, 0x79, &(0x7f0000000100)=""/121, 0x41100, 0x4, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xb, 0x1, 0x398}, 0x10, 0x0, r1}, 0x78) r3 = socket$packet(0x11, 0x3, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={0xffffffffffffffff, r2, 0x10, 0x4, r4}, 0x14) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x6000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x60000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x2, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 348.420132][T12573] FAULT_INJECTION: forcing a failure. [ 348.420132][T12573] name failslab, interval 1, probability 0, space 0, times 0 [ 348.481433][T12573] CPU: 0 PID: 12573 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 348.491349][T12573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.501402][T12573] Call Trace: [ 348.504707][T12573] dump_stack+0x188/0x20d [ 348.509055][T12573] should_fail.cold+0x5/0x14 [ 348.513659][T12573] ? setup_fault_attr+0x1e0/0x1e0 [ 348.518713][T12573] ? mark_held_locks+0xe0/0xe0 [ 348.523493][T12573] should_failslab+0x5/0xf [ 348.527921][T12573] kmem_cache_alloc+0x44/0x730 [ 348.532695][T12573] ? lock_acquire+0x197/0x420 [ 348.537386][T12573] skb_clone+0x14d/0x3c0 [ 348.541648][T12573] netlink_deliver_tap+0x91c/0xb50 [ 348.546771][T12573] ? lock_downgrade+0x7f0/0x7f0 [ 348.551635][T12573] __netlink_sendskb+0x5b/0xb0 [ 348.556412][T12573] netlink_dump+0x709/0xf30 [ 348.560939][T12573] ? __netlink_sendskb+0xb0/0xb0 [ 348.565880][T12573] ? __mutex_unlock_slowpath+0xe2/0x660 [ 348.571463][T12573] __netlink_dump_start+0x648/0x910 [ 348.576675][T12573] ? ctnetlink_alloc_filter+0x220/0x220 [ 348.582240][T12573] ctnetlink_get_conntrack+0x52c/0x660 [ 348.587716][T12573] ? consume_skb+0xfb/0x400 [ 348.592227][T12573] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 348.597691][T12573] ? mutex_trylock+0x2c0/0x2c0 [ 348.602464][T12573] ? find_held_lock+0x2d/0x110 [ 348.607234][T12573] ? ctnetlink_alloc_filter+0x220/0x220 [ 348.612787][T12573] ? ctnetlink_dump_dying+0x30/0x30 [ 348.617987][T12573] ? ctnetlink_dump_helpinfo+0x390/0x390 [ 348.623747][T12573] ? lock_downgrade+0x7f0/0x7f0 [ 348.628608][T12573] ? nla_memcpy+0xa0/0xa0 [ 348.632957][T12573] ? ctnetlink_parse_tuple+0x6d0/0x6d0 [ 348.638437][T12573] nfnetlink_rcv_msg+0xc83/0xf30 [ 348.643411][T12573] ? nfnetlink_bind+0x2b0/0x2b0 [ 348.648309][T12573] ? __local_bh_enable_ip+0x159/0x270 [ 348.653690][T12573] ? lockdep_hardirqs_on+0x417/0x5d0 [ 348.658991][T12573] ? __dev_queue_xmit+0x174a/0x3070 [ 348.664201][T12573] ? __local_bh_enable_ip+0x159/0x270 [ 348.669584][T12573] ? __dev_queue_xmit+0xbf2/0x3070 [ 348.674718][T12573] netlink_rcv_skb+0x15a/0x410 [ 348.679491][T12573] ? nfnetlink_bind+0x2b0/0x2b0 [ 348.684351][T12573] ? netlink_ack+0xa80/0xa80 [ 348.688970][T12573] ? ns_capable_common+0xe2/0x100 [ 348.694015][T12573] nfnetlink_rcv+0x1ac/0x420 [ 348.698613][T12573] ? nfnetlink_rcv_batch+0x1610/0x1610 [ 348.704096][T12573] netlink_unicast+0x537/0x740 [ 348.708874][T12573] ? netlink_attachskb+0x810/0x810 [ 348.713994][T12573] ? _copy_from_iter_full+0x25c/0x870 [ 348.719380][T12573] ? __phys_addr_symbol+0x2c/0x70 [ 348.724404][T12573] ? __check_object_size+0x171/0x437 [ 348.729680][T12573] netlink_sendmsg+0x882/0xe10 [ 348.734432][T12573] ? aa_af_perm+0x260/0x260 [ 348.738922][T12573] ? netlink_unicast+0x740/0x740 [ 348.743856][T12573] ? netlink_unicast+0x740/0x740 [ 348.748801][T12573] sock_sendmsg+0xcf/0x120 [ 348.753254][T12573] ____sys_sendmsg+0x6b9/0x7d0 [ 348.758049][T12573] ? kernel_sendmsg+0x50/0x50 [ 348.762745][T12573] ___sys_sendmsg+0x100/0x170 [ 348.767428][T12573] ? sendmsg_copy_msghdr+0x70/0x70 [ 348.772533][T12573] ? __fget_files+0x329/0x4f0 [ 348.777197][T12573] ? do_dup2+0x520/0x520 [ 348.781452][T12573] ? __fget_light+0x208/0x270 [ 348.786128][T12573] __sys_sendmsg+0xec/0x1b0 [ 348.790626][T12573] ? __sys_sendmsg_sock+0xb0/0xb0 [ 348.795652][T12573] ? vfs_write+0x15b/0x5c0 [ 348.800085][T12573] ? trace_hardirqs_off_caller+0x55/0x230 [ 348.805820][T12573] ? do_syscall_64+0x21/0x790 [ 348.810497][T12573] do_syscall_64+0xf6/0x790 [ 348.815011][T12573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.820891][T12573] RIP: 0033:0x45c679 [ 348.824777][T12573] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.844382][T12573] RSP: 002b:00007fbd08fcac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 348.852795][T12573] RAX: ffffffffffffffda RBX: 00007fbd08fcb6d4 RCX: 000000000045c679 [ 348.860757][T12573] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 348.868756][T12573] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 348.876705][T12573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 348.884655][T12573] R13: 000000000000090f R14: 00000000004d53a0 R15: 0000000000000006 03:27:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, 0x0) 03:27:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x3, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x7200, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x74000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:38 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465df41fbbff7b46b849512b2e32452762f6e756c6c623000"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 03:27:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x9effffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:38 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465763f6e756c180f75ee57fd8b1bcc1ad4e4c920c94df51f5dd46a1245dbbae47e8659f333ff4fa5c5245208e2cbb0b51683809180265c5ac98f203911a78fe259dcf381fe133f351d4fb30d9542e25ceba53aeaf64a96099a990ca747eec51580c2775a0e01e7939d31ffde2ceb9a2e25507d1e049dea2ef21800b1d07fcd4ed3a89819dba73149ee0071a5716158fd9a27bfa5471a93e9ed4515350ec55e7b3aabf41b67215d70881ef4003c873040630dfd190a787205cc93ba160553f651e9885821b2b6fff92d"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000000)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x410040, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000300)) 03:27:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x4, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r2 = accept$inet6(r1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r4, 0x551f) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000000c0)={r6, 0x5, 0x10, 0x7, 0x5000000000000000}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r7, 0x5, 0x4, 0x1}, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, 0x0) 03:27:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf0ffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x7, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x34000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x2, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf5ffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xa, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x400300, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x3, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xe, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfcffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x0, 0x0, 0x5, [], &(0x7f0000000000)=0x4}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffff000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x4, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:40 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="580000000206e7180000000000000000000000000c00078008001240000000000900020073797a3100000000050001000700000012000300686173683a6e65742c706f727400000005000400000000000500050002000000c360"], 0x58}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000200)=0x5, 0x4) r2 = dup3(0xffffffffffffffff, r0, 0x80000) read$char_usb(r2, &(0x7f00000000c0)=""/191, 0xbf) syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0xcba, 0x20440) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x1064042, 0x0) 03:27:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0xffffffff, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x60, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x1000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xffffff7f, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 03:27:40 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xa, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x2000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xdb, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xffffff9e, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:41 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) write$dsp(r0, &(0x7f00000000c0), 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000540)={{0xcc, 0xff, 0xf7, 0x33c, 0x324, 0x800001, 0xd3, 0x1f}, "ccc514bcb7dea811e2f4dcd180449456753fb7c31e9f78ee87127a1779d69604878f3192460f377f9ebce00c847a85c7059244bf2b3b3bcd69fb7564b25a7c85dc7046dfce68b9fae6080c0d433e7d36c8c05ff6b848274fe017b915413d09f407128496198725eb7ec6f6718e706eb0ac76cfdacf0f58dd3097c7be3296f1f2b7f91731755fcc87cd2e69fa468c18d2d1a82f0ba62358cd114c67a13d6e9a5829d72a20e0f3d7a543a0ba5bb1d71e6ef43454fad9879a9c8c48dc1fc279b24cc523430ef7e30562dff6db6d7685cde91e30a5745462cd2f3009a0fb342d8860a4d97bb383658d8c6e4b05f3ed23fc7b", [[], [], [], [], [], [], [], []]}, 0x910) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) [ 351.360603][T12731] FAULT_INJECTION: forcing a failure. [ 351.360603][T12731] name failslab, interval 1, probability 0, space 0, times 0 [ 351.459379][T12731] CPU: 1 PID: 12731 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 351.469324][T12731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.479457][T12731] Call Trace: [ 351.482763][T12731] dump_stack+0x188/0x20d [ 351.487113][T12731] should_fail.cold+0x5/0x14 [ 351.491718][T12731] ? setup_fault_attr+0x1e0/0x1e0 [ 351.496765][T12731] ? sock_free_inode+0x20/0x20 [ 351.501536][T12731] should_failslab+0x5/0xf [ 351.505956][T12731] kmem_cache_alloc+0x29b/0x730 [ 351.510812][T12731] ? find_held_lock+0x2d/0x110 [ 351.515587][T12731] ? apparmor_path_link+0xb70/0xb70 [ 351.520796][T12731] ? sock_free_inode+0x20/0x20 [ 351.525567][T12731] sock_alloc_inode+0x18/0x1c0 [ 351.530332][T12731] ? sock_free_inode+0x20/0x20 [ 351.535101][T12731] alloc_inode+0x61/0x1e0 [ 351.539442][T12731] new_inode_pseudo+0x14/0xe0 [ 351.544125][T12731] sock_alloc+0x3c/0x260 [ 351.548377][T12731] __sock_create+0xba/0x730 [ 351.552897][T12731] ? __local_bh_enable_ip+0x159/0x270 [ 351.558391][T12731] sctp_do_peeloff+0x186/0x410 [ 351.563167][T12731] ? sctp_copy_sock+0xd50/0xd50 [ 351.568022][T12731] ? lock_downgrade+0x7f0/0x7f0 [ 351.572884][T12731] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 351.579478][T12731] ? sctp_do_peeloff+0x410/0x410 [ 351.584433][T12731] ? __might_fault+0x190/0x1d0 [ 351.589215][T12731] sctp_getsockopt+0x1a60/0x70f3 [ 351.594178][T12731] ? __lock_acquire+0x827/0x5270 [ 351.599146][T12731] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 351.606174][T12731] ? __lock_acquire+0x827/0x5270 [ 351.611128][T12731] ? find_held_lock+0x2d/0x110 [ 351.615899][T12731] ? __fget_files+0x307/0x4f0 [ 351.620592][T12731] ? lock_downgrade+0x7f0/0x7f0 [ 351.625461][T12731] ? rcu_read_lock_held_common+0x130/0x130 [ 351.631286][T12731] ? aa_label_sk_perm+0x89/0xe0 [ 351.636147][T12731] ? aa_sk_perm+0x319/0xac0 [ 351.640657][T12731] ? do_dup2+0x520/0x520 [ 351.644909][T12731] ? aa_af_perm+0x260/0x260 [ 351.649453][T12731] ? __sys_getsockopt+0x14b/0x2e0 [ 351.654488][T12731] __sys_getsockopt+0x14b/0x2e0 [ 351.659347][T12731] ? kernel_accept+0x360/0x360 [ 351.664113][T12731] ? fput_many+0x2f/0x1a0 [ 351.668455][T12731] ? ksys_write+0x19f/0x250 [ 351.672961][T12731] ? __ia32_sys_read+0xb0/0xb0 [ 351.677804][T12731] ? __ia32_sys_clock_settime+0x260/0x260 [ 351.683540][T12731] __x64_sys_getsockopt+0xba/0x150 [ 351.688657][T12731] ? lockdep_hardirqs_on+0x417/0x5d0 [ 351.693951][T12731] do_syscall_64+0xf6/0x790 [ 351.698471][T12731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.704367][T12731] RIP: 0033:0x45c679 [ 351.708260][T12731] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.727858][T12731] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 351.736263][T12731] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 351.744232][T12731] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 351.752207][T12731] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 03:27:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:41 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) exit(0x80000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f00000000c0)) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0x4, 0x40) 03:27:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffffff0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xe, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffffff5, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 351.760179][T12731] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 351.768149][T12731] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000000 03:27:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x3000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 351.863804][T12731] socket: no more sockets 03:27:41 executing program 5 (fault-call:4 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x300, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x60, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffffffc, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x4000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x700, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xffffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 352.272476][T12781] FAULT_INJECTION: forcing a failure. [ 352.272476][T12781] name failslab, interval 1, probability 0, space 0, times 0 [ 352.327733][T12781] CPU: 1 PID: 12781 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 352.337661][T12781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.347716][T12781] Call Trace: [ 352.351022][T12781] dump_stack+0x188/0x20d [ 352.355376][T12781] should_fail.cold+0x5/0x14 [ 352.359984][T12781] ? setup_fault_attr+0x1e0/0x1e0 [ 352.365041][T12781] should_failslab+0x5/0xf [ 352.369472][T12781] kmem_cache_alloc+0x29b/0x730 [ 352.374411][T12781] ? inet6_create+0x2e8/0xf80 [ 352.379110][T12781] sk_prot_alloc+0x5f/0x2f0 [ 352.383624][T12781] sk_alloc+0x36/0xfa0 [ 352.387707][T12781] inet6_create+0x35b/0xf80 [ 352.392232][T12781] __sock_create+0x3cb/0x730 [ 352.397100][T12781] sctp_do_peeloff+0x186/0x410 [ 352.401865][T12781] ? sctp_copy_sock+0xd50/0xd50 [ 352.406720][T12781] ? lock_downgrade+0x7f0/0x7f0 [ 352.411587][T12781] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 352.418180][T12781] ? sctp_do_peeloff+0x410/0x410 [ 352.423136][T12781] ? __might_fault+0x190/0x1d0 [ 352.427908][T12781] sctp_getsockopt+0x1a60/0x70f3 [ 352.432862][T12781] ? __lock_acquire+0x827/0x5270 [ 352.437820][T12781] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 352.444681][T12781] ? __lock_acquire+0x827/0x5270 [ 352.449632][T12781] ? find_held_lock+0x2d/0x110 [ 352.454408][T12781] ? __fget_files+0x307/0x4f0 [ 352.459099][T12781] ? lock_downgrade+0x7f0/0x7f0 [ 352.463966][T12781] ? rcu_read_lock_held_common+0x130/0x130 [ 352.469795][T12781] ? aa_label_sk_perm+0x89/0xe0 [ 352.474661][T12781] ? aa_sk_perm+0x319/0xac0 [ 352.479170][T12781] ? do_dup2+0x520/0x520 [ 352.483428][T12781] ? aa_af_perm+0x260/0x260 [ 352.487964][T12781] ? __sys_getsockopt+0x14b/0x2e0 [ 352.492993][T12781] __sys_getsockopt+0x14b/0x2e0 [ 352.497851][T12781] ? kernel_accept+0x360/0x360 [ 352.502626][T12781] ? fput_many+0x2f/0x1a0 [ 352.506960][T12781] ? ksys_write+0x19f/0x250 [ 352.511471][T12781] ? __ia32_sys_read+0xb0/0xb0 [ 352.516241][T12781] ? __ia32_sys_clock_settime+0x260/0x260 [ 352.521972][T12781] __x64_sys_getsockopt+0xba/0x150 [ 352.527092][T12781] ? lockdep_hardirqs_on+0x417/0x5d0 [ 352.532400][T12781] do_syscall_64+0xf6/0x790 [ 352.536916][T12781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.542819][T12781] RIP: 0033:0x45c679 [ 352.546715][T12781] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.566319][T12781] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 03:27:42 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)="ec144fe243bc139e2f8fd49906b3c4c0624b3c8bf2926d6be0faae1254a1fd06a491cf99149a970989f68f476188e5c7e7a85e7934a2f4e10d2be12cfd86279f0ade042cd39b5a4c1e122731b7be94d4a304f06b61045e90fa637e273873989352960b5fa43bac88bb16718d7ad56ec55021fa402e9d5eb25c2bb771c0ad7d65109ccc2c345331b5e142114ec030d2587a86ec4b519b18d696ad91eb7420e05a6a1379e3740f4a1b3545ee6f75f91e4703b8eed40b11131368", 0xb9, r0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/nullt0\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xf0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xa000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xa00, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 352.574733][T12781] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 352.582701][T12781] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 352.590675][T12781] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 352.598636][T12781] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 352.606598][T12781] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000001 03:27:42 executing program 5 (fault-call:4 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xe000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:42 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r0 = geteuid() r1 = geteuid() r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r3, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0x8, &(0x7f0000001780)=[{&(0x7f0000000100)="fc3d5651c8855311949b4c8fc7e875", 0xf, 0x1589a195}, {&(0x7f0000000200)="cfc3fd779694c4ee9a27902cb59af184a19d96c205480f2af902ed9f9a2c1b6ff2e460160579d5d422a65ae29cb0a14dac235bd58e2231bc7bc6dcde929ca0a7963163384c5ef81e624b0a4626dfcbf1ec6816013aa94404ef1cfd84cd117e8c6adce6cd03f845b5bc5414934d8bad72531052ad880d682bd85cc00ffaf899d765af0c41768b04b9089a010289353166fc77e1bd8e8dd8a6744c45f6e061680c0d80df009294db8e42fd9e5480846386cee95fa46f8f80605623a2eb0697b71d1574", 0xc2, 0x9}, {&(0x7f0000000300)="573d4a39265bff48efaa050c061745883daf1b2dfb703040554919ae85669b07ef2afc8ff86afeae2f50f4157a501d821a48931efc2dcd34212b1dfcc2fd367882", 0x41, 0x3}, {&(0x7f0000000380)="8b52b2da5ad424811debae435bc8e3b5dd6f9cce4b801e4589238e43078548dd615686ab6f8e22b2554940690d0b07d907fa58b95bb92132b4561fc8a02e6132a2466e2800453967b3a90b35f6f5463e6f9256b05884a94817be8700856853b32a9f39d5ffd20a0af4d99d7f2db46844dac39bd32ee334c0f30ba6ce2187ba7d6f825badaf3e97ea435baf83ce4d9687719a19ed82ddc42479cac6c8f243132bdcaaf924c5d674030a99a23ce48707cd6e942065ed1e0ef2809509c3bba9b571e1955840197b6c98", 0xc8, 0x2}, {&(0x7f0000000480)="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", 0x1000, 0x7}, {&(0x7f0000001480)="783bfa567ae6283dbbc79367c618174df7f05d68e34ab69ffe415bdc269c24d0378cf2ad1c3009869eda5934d8443de4d306098515eb9301394b47f26b1f65112dde0f10e8a975449e38532212c7b2fa12fff1d7ae2830e688160e24a9797241bcf468996caa3c935d515171510accf99918b1cdc2b20f78714134b5c9d44638464086e3c9c9fd2fe9353b6620d6cbd6f96d1f39f7192a310d38b77956b968563aee83de66bd213b302480b1d371efb551a2d8d58fdfba9ed3276bc19c18cbf77ae9439c6d0a83353ab13b7911eb07a3fd8ea34f176ed4baeb35ecf15ab7d1f168069c274378c01c51b3087f32263fe7d4a282", 0xf3, 0x6}, {&(0x7f0000001580)="adfe2beae7c2ce4be247a232aaaa75979e5d386cbe6a095407d94f11968399a9217af8ab50ca09f95cee1fb1ae6c856325a6a6724e157ca9c155f345da4b8a228f865c651d1bd82ce3b235d654bd239d67fee61f7ef2dfbd5b0ecd9570cf864d2286ab3fb1a8e39a208fb306c74a9e4055f0aff8cc1a22c184c7eab1a21484d56d2caf4ef33bc8e91e612aec26d9af02eba3cf066d0bf6b2dd3d799b8fc62074eb61072c65f0e5904a70569ff848914709d994a1150dc8bf36d3b3ca581f6ea327fa596f1e3562c1ecfd1f7eef72", 0xce, 0x8000}, {&(0x7f0000001680)="b56f5ef8b1a29a5611772a492c2ad811a08f38f66bc8ac14cd590dc1db3ad9080f58956fc4a26b54f27f53416c7d830bee63a45276db82519b844f3817c306099697d3771182cefbec8689d9269a12e9d570f150dd86e53b8a8e183d3d893380354bc8818759c9bffedaa3f61f5b333bba017b7d27545a4008fd1384e1fe0aecf770621946c8b90ece22543e2812f72dda13d5f4f6d32c9619b4e99fc28ca899400303da69a6c68cf91d7b8cd4c804a7146ea0f7f43741eedd094570ec32c741d26f344cbeee5f24f6f556c234179be905c2c5e7efe02efe7396fe28ba2778efd767f8988686815fa06bb253", 0xec, 0x8}], 0x3829000, &(0x7f0000001840)={[{@iocharset={'iocharset', 0x3d, 'default'}}, {@type={'type', 0x3d, "73983827"}}, {@part={'part', 0x3d, 0x8}}], [{@euid_gt={'euid>', r0}}, {@smackfshat={'smackfshat', 0x3d, '-'}}, {@pcr={'pcr', 0x3d, 0x25}}, {@obj_role={'obj_role'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'cgroup\x00'}}, {@uid_lt={'uid<', r3}}]}) 03:27:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xe00, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x134, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf00, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 353.206777][T12826] FAULT_INJECTION: forcing a failure. [ 353.206777][T12826] name failslab, interval 1, probability 0, space 0, times 0 [ 353.276429][T12826] CPU: 0 PID: 12826 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 353.286347][T12826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.296410][T12826] Call Trace: [ 353.299714][T12826] dump_stack+0x188/0x20d [ 353.304069][T12826] should_fail.cold+0x5/0x14 [ 353.308671][T12826] ? setup_fault_attr+0x1e0/0x1e0 [ 353.313827][T12826] should_failslab+0x5/0xf [ 353.318264][T12826] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 353.323657][T12826] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 353.329668][T12826] apparmor_sk_alloc_security+0x81/0x100 [ 353.335312][T12826] security_sk_alloc+0x6c/0xb0 [ 353.340086][T12826] sk_prot_alloc+0xae/0x2f0 [ 353.344601][T12826] sk_alloc+0x36/0xfa0 [ 353.348692][T12826] inet6_create+0x35b/0xf80 [ 353.353215][T12826] __sock_create+0x3cb/0x730 [ 353.357820][T12826] sctp_do_peeloff+0x186/0x410 [ 353.362597][T12826] ? sctp_copy_sock+0xd50/0xd50 [ 353.367461][T12826] ? lock_downgrade+0x7f0/0x7f0 [ 353.372332][T12826] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 353.378926][T12826] ? sctp_do_peeloff+0x410/0x410 [ 353.383874][T12826] ? __might_fault+0x190/0x1d0 [ 353.388652][T12826] sctp_getsockopt+0x1a60/0x70f3 [ 353.393605][T12826] ? __lock_acquire+0x827/0x5270 [ 353.398559][T12826] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 353.405419][T12826] ? __lock_acquire+0x827/0x5270 [ 353.410370][T12826] ? find_held_lock+0x2d/0x110 [ 353.415143][T12826] ? __fget_files+0x307/0x4f0 [ 353.419836][T12826] ? lock_downgrade+0x7f0/0x7f0 03:27:43 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='devpts\x00', 0x48, &(0x7f0000000140)='/dev/nullb0\x00') mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x3f000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 353.424701][T12826] ? rcu_read_lock_held_common+0x130/0x130 [ 353.430526][T12826] ? aa_label_sk_perm+0x89/0xe0 [ 353.435396][T12826] ? aa_sk_perm+0x319/0xac0 [ 353.439910][T12826] ? do_dup2+0x520/0x520 [ 353.444159][T12826] ? aa_af_perm+0x260/0x260 [ 353.448694][T12826] ? __sys_getsockopt+0x14b/0x2e0 [ 353.453730][T12826] __sys_getsockopt+0x14b/0x2e0 [ 353.458596][T12826] ? kernel_accept+0x360/0x360 [ 353.463373][T12826] ? fput_many+0x2f/0x1a0 [ 353.467711][T12826] ? ksys_write+0x19f/0x250 [ 353.472219][T12826] ? __ia32_sys_read+0xb0/0xb0 [ 353.477001][T12826] ? __ia32_sys_clock_settime+0x260/0x260 [ 353.482730][T12826] __x64_sys_getsockopt+0xba/0x150 [ 353.487843][T12826] ? lockdep_hardirqs_on+0x417/0x5d0 [ 353.493137][T12826] do_syscall_64+0xf6/0x790 [ 353.497659][T12826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.503653][T12826] RIP: 0033:0x45c679 [ 353.507578][T12826] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.527186][T12826] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 353.535635][T12826] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 353.540562][T12842] devpts: called with bogus options [ 353.543603][T12826] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 353.543626][T12826] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 353.543634][T12826] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 353.543641][T12826] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000002 03:27:43 executing program 5 (fault-call:4 fault-nth:3): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x300, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x3f00, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x40000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:43 executing program 3: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6ec19a2305c108f0756c40e4f6cec1b1e0db2926b900000000"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x121440, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) fanotify_mark(r0, 0x180, 0x8000023, r2, &(0x7f0000000080)='./file0\x00') 03:27:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000000)={0x1, 0xf963680f, 0x1, 0x8001, 0x2, @stepwise={{0x6, 0x9}, {0x4, 0x7ff}, {0xfffffff7, 0x8}}}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) r4 = accept4$x25(r3, &(0x7f0000000380)={0x9, @remote}, &(0x7f00000003c0)=0x12, 0x800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000280)="12feea12185e83789be780d99fdf2cee41ff7849d281f6daa19ad953a75ec7b15fe3e203df379dda53173889da0b38189f764b34bd93d3373e0d007faec69b23fcf1cc9d971bd7d4c82499108347eb83834be7f573a94e23d9c726ccdfc86798722145ed4afe88b52f8605323be8013ab21809f6113c3cbf5880e60ab2192cfd29f589ecebc105d306a54791475ca06d6c352b59a43fe5ddf8301022a63493d8ca50c546f474900c534a6b0c78a2e5f6650e5120c795f537e0506fce17f5f9a28f6ad37fe4bc", 0xc6, r4}, 0x68) 03:27:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x6000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0xe}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x60000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 354.162922][T12868] FAULT_INJECTION: forcing a failure. [ 354.162922][T12868] name failslab, interval 1, probability 0, space 0, times 0 03:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xa00, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) [ 354.261527][T12868] CPU: 0 PID: 12868 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 354.271449][T12868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.281505][T12868] Call Trace: [ 354.284807][T12868] dump_stack+0x188/0x20d [ 354.289161][T12868] should_fail.cold+0x5/0x14 [ 354.293765][T12868] ? setup_fault_attr+0x1e0/0x1e0 [ 354.298816][T12868] should_failslab+0x5/0xf [ 354.303243][T12868] kmem_cache_alloc_trace+0x2d0/0x7d0 03:27:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0xf}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 354.308627][T12868] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 354.314266][T12868] sctp_endpoint_new+0x72/0xc40 [ 354.319147][T12868] sctp_init_sock+0xcdf/0x1430 [ 354.323933][T12868] ? sctp_destroy_sock+0x3c0/0x3c0 [ 354.329067][T12868] inet6_create+0x9cb/0xf80 [ 354.333595][T12868] __sock_create+0x3cb/0x730 [ 354.338229][T12868] sctp_do_peeloff+0x186/0x410 [ 354.343002][T12868] ? sctp_copy_sock+0xd50/0xd50 [ 354.347866][T12868] ? lock_downgrade+0x7f0/0x7f0 [ 354.352740][T12868] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 354.359339][T12868] ? sctp_do_peeloff+0x410/0x410 [ 354.364293][T12868] ? __might_fault+0x190/0x1d0 [ 354.369075][T12868] sctp_getsockopt+0x1a60/0x70f3 [ 354.374028][T12868] ? __lock_acquire+0x827/0x5270 [ 354.378986][T12868] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 354.385879][T12868] ? __lock_acquire+0x827/0x5270 [ 354.390835][T12868] ? find_held_lock+0x2d/0x110 [ 354.395609][T12868] ? __fget_files+0x307/0x4f0 [ 354.401261][T12868] ? lock_downgrade+0x7f0/0x7f0 [ 354.406126][T12868] ? rcu_read_lock_held_common+0x130/0x130 [ 354.411959][T12868] ? aa_label_sk_perm+0x89/0xe0 [ 354.416829][T12868] ? aa_sk_perm+0x319/0xac0 [ 354.421345][T12868] ? do_dup2+0x520/0x520 [ 354.429696][T12868] ? aa_af_perm+0x260/0x260 [ 354.434236][T12868] ? __sys_getsockopt+0x14b/0x2e0 [ 354.439285][T12868] __sys_getsockopt+0x14b/0x2e0 [ 354.444158][T12868] ? kernel_accept+0x360/0x360 [ 354.448956][T12868] ? fput_many+0x2f/0x1a0 [ 354.453342][T12868] ? ksys_write+0x19f/0x250 [ 354.457864][T12868] ? __ia32_sys_read+0xb0/0xb0 [ 354.463242][T12868] ? __ia32_sys_clock_settime+0x260/0x260 [ 354.468982][T12868] __x64_sys_getsockopt+0xba/0x150 [ 354.474113][T12868] ? lockdep_hardirqs_on+0x417/0x5d0 [ 354.479439][T12868] do_syscall_64+0xf6/0x790 [ 354.483969][T12868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.489955][T12868] RIP: 0033:0x45c679 [ 354.493880][T12868] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.513498][T12868] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 354.521925][T12868] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 354.529910][T12868] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 354.537983][T12868] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 354.547790][T12868] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 354.555789][T12868] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000003 03:27:44 executing program 5 (fault-call:4 fault-nth:4): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xdb00, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x72000000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x60}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xe00, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:44 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="af24bea5623000fcc0270274f4fcc29d0821341351d70100010000000000dc078b49ac0239b7eef7910a66000000001b7b4f179c8e2da9aace36bffb754dfbf866673bc8b5d008e47b8802fff6c1b0a1f5d4c8dea8e4ae2dce5bbac5d422ff0d964fc44b4b3ae31a39"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x74}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 355.089548][T12908] FAULT_INJECTION: forcing a failure. [ 355.089548][T12908] name failslab, interval 1, probability 0, space 0, times 0 [ 355.128651][T12908] CPU: 0 PID: 12908 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 03:27:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x34000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 355.138591][T12908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.148685][T12908] Call Trace: [ 355.152020][T12908] dump_stack+0x188/0x20d [ 355.156377][T12908] should_fail.cold+0x5/0x14 [ 355.160994][T12908] ? setup_fault_attr+0x1e0/0x1e0 [ 355.166052][T12908] should_failslab+0x5/0xf [ 355.170476][T12908] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 355.175869][T12908] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 355.181440][T12908] sctp_endpoint_new+0xf6/0xc40 [ 355.186312][T12908] sctp_init_sock+0xcdf/0x1430 [ 355.191116][T12908] ? sctp_destroy_sock+0x3c0/0x3c0 [ 355.196242][T12908] inet6_create+0x9cb/0xf80 [ 355.200773][T12908] __sock_create+0x3cb/0x730 [ 355.205380][T12908] sctp_do_peeloff+0x186/0x410 [ 355.210166][T12908] ? sctp_copy_sock+0xd50/0xd50 [ 355.215037][T12908] ? lock_downgrade+0x7f0/0x7f0 [ 355.219909][T12908] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 355.226506][T12908] ? sctp_do_peeloff+0x410/0x410 [ 355.231462][T12908] ? __might_fault+0x190/0x1d0 03:27:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 355.236297][T12908] sctp_getsockopt+0x1a60/0x70f3 [ 355.241272][T12908] ? __lock_acquire+0x827/0x5270 [ 355.246228][T12908] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 355.253180][T12908] ? __lock_acquire+0x827/0x5270 [ 355.258127][T12908] ? find_held_lock+0x2d/0x110 [ 355.262917][T12908] ? __fget_files+0x307/0x4f0 [ 355.267625][T12908] ? lock_downgrade+0x7f0/0x7f0 [ 355.272489][T12908] ? rcu_read_lock_held_common+0x130/0x130 [ 355.278316][T12908] ? aa_label_sk_perm+0x89/0xe0 [ 355.283176][T12908] ? aa_sk_perm+0x319/0xac0 [ 355.287689][T12908] ? do_dup2+0x520/0x520 [ 355.291944][T12908] ? aa_af_perm+0x260/0x260 [ 355.296483][T12908] ? __sys_getsockopt+0x14b/0x2e0 [ 355.303950][T12908] __sys_getsockopt+0x14b/0x2e0 [ 355.308816][T12908] ? kernel_accept+0x360/0x360 [ 355.313596][T12908] ? fput_many+0x2f/0x1a0 [ 355.317933][T12908] ? ksys_write+0x19f/0x250 [ 355.322453][T12908] ? __ia32_sys_read+0xb0/0xb0 [ 355.327223][T12908] ? __ia32_sys_clock_settime+0x260/0x260 [ 355.332959][T12908] __x64_sys_getsockopt+0xba/0x150 03:27:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x400300, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 355.338080][T12908] ? lockdep_hardirqs_on+0x417/0x5d0 [ 355.343375][T12908] do_syscall_64+0xf6/0x790 [ 355.347889][T12908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.353783][T12908] RIP: 0033:0x45c679 [ 355.357685][T12908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.377292][T12908] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 03:27:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x9effffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 355.385729][T12908] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 355.393709][T12908] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 355.401684][T12908] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 355.409660][T12908] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 355.417633][T12908] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000004 03:27:45 executing program 5 (fault-call:4 fault-nth:5): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:45 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x408a) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f0680000000000000"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0xc000, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni-avx2\x00'}, 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'system.', '#)bdevvboxnet0,}\x12\\+\x00'}, &(0x7f0000000100)='\x00', 0x1, 0x0) 03:27:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xec0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf0ffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf0ffff, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x1000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xf5ffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:45 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x64) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x1, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230005f902d990f8cb37b0ef624bdbbf5276b7f565431bf5d"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) [ 356.029158][T12946] FAULT_INJECTION: forcing a failure. [ 356.029158][T12946] name failslab, interval 1, probability 0, space 0, times 0 [ 356.093146][T12946] CPU: 1 PID: 12946 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 356.103089][T12946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.113152][T12946] Call Trace: [ 356.116466][T12946] dump_stack+0x188/0x20d [ 356.120822][T12946] should_fail.cold+0x5/0x14 [ 356.125432][T12946] ? setup_fault_attr+0x1e0/0x1e0 [ 356.130485][T12946] should_failslab+0x5/0xf [ 356.134910][T12946] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 356.140311][T12946] sctp_auth_shkey_create+0x81/0x1a0 [ 356.145612][T12946] sctp_endpoint_new+0x59a/0xc40 [ 356.150608][T12946] sctp_init_sock+0xcdf/0x1430 [ 356.155389][T12946] ? sctp_destroy_sock+0x3c0/0x3c0 [ 356.160524][T12946] inet6_create+0x9cb/0xf80 [ 356.165058][T12946] __sock_create+0x3cb/0x730 [ 356.169668][T12946] sctp_do_peeloff+0x186/0x410 [ 356.174451][T12946] ? sctp_copy_sock+0xd50/0xd50 [ 356.179311][T12946] ? lock_downgrade+0x7f0/0x7f0 [ 356.184182][T12946] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 356.190780][T12946] ? sctp_do_peeloff+0x410/0x410 [ 356.195732][T12946] ? __might_fault+0x190/0x1d0 [ 356.200516][T12946] sctp_getsockopt+0x1a60/0x70f3 [ 356.205465][T12946] ? __lock_acquire+0x827/0x5270 [ 356.210530][T12946] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 356.217389][T12946] ? __lock_acquire+0x827/0x5270 [ 356.222338][T12946] ? find_held_lock+0x2d/0x110 [ 356.227133][T12946] ? __fget_files+0x307/0x4f0 [ 356.231840][T12946] ? lock_downgrade+0x7f0/0x7f0 [ 356.236776][T12946] ? rcu_read_lock_held_common+0x130/0x130 [ 356.242603][T12946] ? aa_label_sk_perm+0x89/0xe0 [ 356.247488][T12946] ? aa_sk_perm+0x319/0xac0 [ 356.253947][T12946] ? do_dup2+0x520/0x520 [ 356.258199][T12946] ? aa_af_perm+0x260/0x260 [ 356.262728][T12946] ? __sys_getsockopt+0x14b/0x2e0 [ 356.267753][T12946] __sys_getsockopt+0x14b/0x2e0 [ 356.272607][T12946] ? kernel_accept+0x360/0x360 [ 356.277369][T12946] ? fput_many+0x2f/0x1a0 [ 356.281700][T12946] ? ksys_write+0x19f/0x250 [ 356.286217][T12946] ? __ia32_sys_read+0xb0/0xb0 [ 356.290993][T12946] ? __ia32_sys_clock_settime+0x260/0x260 [ 356.296738][T12946] __x64_sys_getsockopt+0xba/0x150 [ 356.301859][T12946] ? lockdep_hardirqs_on+0x417/0x5d0 [ 356.307167][T12946] do_syscall_64+0xf6/0x790 [ 356.311770][T12946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.317673][T12946] RIP: 0033:0x45c679 [ 356.321581][T12946] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:27:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x3401, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfcffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 356.341193][T12946] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 356.349607][T12946] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 356.357584][T12946] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 356.365559][T12946] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 356.373527][T12946] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 356.381508][T12946] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000005 03:27:46 executing program 5 (fault-call:4 fault-nth:6): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffff000, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x3f00, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000001c0)={0x0, 0x2000000, &(0x7f0000000180)={&(0x7f0000000840)={0x2c, r2, 0x12fc8ad0283830c7, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x328, r2, 0x205, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x3, 0x3d, @empty, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @mcast1, 0x7ff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x924}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x21}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MEDIA={0x78, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x34a9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffd}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xbc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffb}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x57a6b4d9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}]}]}, 0x328}, 0x1, 0x0, 0x0, 0x40080}, 0x20000001) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6461762f2e756c6c6230ff"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x4000000000000016, &(0x7f0000000080)) mlockall(0x4) ptrace(0x4206, r3) setpgid(0xffffffffffffffff, r3) 03:27:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x2000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0x18, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000000), &(0x7f00000000c0)=0x4) symlinkat(&(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="000000000000013000000000"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x3000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xffffff7f, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 356.964172][T12986] FAULT_INJECTION: forcing a failure. [ 356.964172][T12986] name failslab, interval 1, probability 0, space 0, times 0 03:27:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0xe}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x6000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) [ 357.085726][T12986] CPU: 1 PID: 12986 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 357.095669][T12986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.105729][T12986] Call Trace: [ 357.109035][T12986] dump_stack+0x188/0x20d [ 357.113392][T12986] should_fail.cold+0x5/0x14 [ 357.118005][T12986] ? setup_fault_attr+0x1e0/0x1e0 [ 357.123050][T12986] ? mark_held_locks+0x9f/0xe0 [ 357.127830][T12986] ? apparmor_socket_post_create+0x6ce/0x16b0 [ 357.133915][T12986] should_failslab+0x5/0xf [ 357.138369][T12986] __kmalloc+0x71/0x7a0 [ 357.142535][T12986] ? sock_kmalloc+0xb5/0x100 [ 357.147151][T12986] sock_kmalloc+0xb5/0x100 [ 357.151587][T12986] ? sctp_v6_ip_options_len+0x320/0x320 [ 357.157219][T12986] ipv6_dup_options+0x4f/0x2e0 [ 357.162017][T12986] sctp_v6_copy_ip_options+0x1ee/0x390 [ 357.167549][T12986] sctp_do_peeloff+0x2a2/0x410 [ 357.172333][T12986] ? sctp_copy_sock+0xd50/0xd50 [ 357.177197][T12986] ? lock_downgrade+0x7f0/0x7f0 [ 357.182069][T12986] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 357.188713][T12986] ? sctp_do_peeloff+0x410/0x410 [ 357.193672][T12986] ? __might_fault+0x190/0x1d0 [ 357.198449][T12986] sctp_getsockopt+0x1a60/0x70f3 [ 357.203398][T12986] ? __lock_acquire+0x827/0x5270 [ 357.208352][T12986] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 357.215207][T12986] ? __lock_acquire+0x827/0x5270 [ 357.220159][T12986] ? find_held_lock+0x2d/0x110 [ 357.224935][T12986] ? __fget_files+0x307/0x4f0 [ 357.229630][T12986] ? lock_downgrade+0x7f0/0x7f0 [ 357.234499][T12986] ? rcu_read_lock_held_common+0x130/0x130 [ 357.240331][T12986] ? aa_label_sk_perm+0x89/0xe0 [ 357.245200][T12986] ? aa_sk_perm+0x319/0xac0 [ 357.249718][T12986] ? do_dup2+0x520/0x520 [ 357.253976][T12986] ? aa_af_perm+0x260/0x260 [ 357.258519][T12986] ? __sys_getsockopt+0x14b/0x2e0 [ 357.263555][T12986] __sys_getsockopt+0x14b/0x2e0 [ 357.268430][T12986] ? kernel_accept+0x360/0x360 [ 357.273207][T12986] ? fput_many+0x2f/0x1a0 [ 357.277660][T12986] ? ksys_write+0x19f/0x250 [ 357.282183][T12986] ? __ia32_sys_read+0xb0/0xb0 [ 357.286983][T12986] ? __ia32_sys_clock_settime+0x260/0x260 [ 357.292733][T12986] __x64_sys_getsockopt+0xba/0x150 [ 357.297860][T12986] ? lockdep_hardirqs_on+0x417/0x5d0 [ 357.303170][T12986] do_syscall_64+0xf6/0x790 [ 357.307695][T12986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.313612][T12986] RIP: 0033:0x45c679 [ 357.317530][T12986] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.337148][T12986] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 357.345577][T12986] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 357.353557][T12986] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 357.361535][T12986] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 357.369514][T12986] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 357.377492][T12986] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000006 [ 357.402152][T12986] sctp: sctp_v6_copy_ip_options: Failed to copy ip options 03:27:47 executing program 5 (fault-call:4 fault-nth:7): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x4000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xffffff9e, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/d\\v/nullb0\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xc00e, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x60}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffffff0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:47 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r1, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x400}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x24040000}, 0x8081) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0xf48, 0x2, &(0x7f0000000240)=[{&(0x7f00000001c0)="5c2e6d3d7a3fc2a9a8a7f3de99b0c0f67177a8ba4dbd70fe7a2d2ab2352b40ec71df0cc07af6266ddb1c2af56b19368123fbbc317abb763bad993c653c5407bb05f8e884e8981008a20ae8563dcf4ca458dd616c16ce064bfc6336cf810ae7f73d25bda537cc4130357ae3735c44f2028ad1e6090cab5e124f93c9a141ae85", 0x7f, 0x2}, {&(0x7f00000000c0)="dbbc88088039b2e50b260724c282a17dca603aeb9286e7d7ef3f8d6900039fb421411157a6c5908225458723", 0x2c, 0x1000}], 0x8e0000, &(0x7f0000000480)=ANY=[@ANYBLOB='iocharset=cp737,appraise,fowner>', @ANYRESDEC, @ANYBLOB="2c66736d216769000030050000000000000030303030303030303124666f776e65723d809fa10b69cec19b7146448ca83a59a7c3dbd05e510d883f464b82cccd954e18fd24d7c777b8887dbcc0777e010ff282045b73d8feb04042612d8b78fa0841a03222b058c7d82d0f3058f2934fe04aba92010df6cee4ddcad67f038ef21533c32b9f9d025b15a9a70bde4029dfcdf1f9c5b2d624100163b2acece1f293cc5ec3661d0062b440db6636fec2c8cb07dbecce6b", @ANYRESDEC=r2, @ANYBLOB=',fscontext=root,appraise,\x00']) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x51000, 0x0) 03:27:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x7000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 357.923222][T13028] FAULT_INJECTION: forcing a failure. [ 357.923222][T13028] name failslab, interval 1, probability 0, space 0, times 0 [ 357.979996][T13028] CPU: 1 PID: 13028 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 357.990072][T13028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.000138][T13028] Call Trace: [ 358.003501][T13028] dump_stack+0x188/0x20d [ 358.007858][T13028] should_fail.cold+0x5/0x14 [ 358.012465][T13028] ? setup_fault_attr+0x1e0/0x1e0 [ 358.017530][T13028] should_failslab+0x5/0xf [ 358.021955][T13028] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 358.027335][T13028] ? sctp_sock_migrate+0x4b9/0x1460 [ 358.032544][T13028] ? mark_lock+0xbc/0x1220 [ 358.036976][T13028] sctp_add_bind_addr+0x93/0x380 [ 358.041934][T13028] sctp_bind_addr_dup+0xd0/0x130 [ 358.046886][T13028] sctp_sock_migrate+0x517/0x1460 [ 358.052029][T13028] ? sctp_v6_ip_options_len+0x320/0x320 [ 358.057582][T13028] sctp_do_peeloff+0x2dc/0x410 [ 358.062358][T13028] ? sctp_copy_sock+0xd50/0xd50 [ 358.067225][T13028] ? lock_downgrade+0x7f0/0x7f0 [ 358.072092][T13028] sctp_getsockopt_peeloff_common.isra.0+0x82/0x240 [ 358.078697][T13028] ? sctp_do_peeloff+0x410/0x410 [ 358.083650][T13028] ? __might_fault+0x190/0x1d0 [ 358.088453][T13028] sctp_getsockopt+0x1a60/0x70f3 [ 358.093408][T13028] ? __lock_acquire+0x827/0x5270 [ 358.098366][T13028] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 358.105227][T13028] ? __lock_acquire+0x827/0x5270 [ 358.110183][T13028] ? find_held_lock+0x2d/0x110 [ 358.114961][T13028] ? __fget_files+0x307/0x4f0 [ 358.119658][T13028] ? lock_downgrade+0x7f0/0x7f0 [ 358.124531][T13028] ? rcu_read_lock_held_common+0x130/0x130 [ 358.130356][T13028] ? aa_label_sk_perm+0x89/0xe0 [ 358.135222][T13028] ? aa_sk_perm+0x319/0xac0 [ 358.139736][T13028] ? do_dup2+0x520/0x520 [ 358.143992][T13028] ? aa_af_perm+0x260/0x260 [ 358.148528][T13028] ? __sys_getsockopt+0x14b/0x2e0 [ 358.153565][T13028] __sys_getsockopt+0x14b/0x2e0 [ 358.158435][T13028] ? kernel_accept+0x360/0x360 [ 358.163208][T13028] ? fput_many+0x2f/0x1a0 [ 358.167549][T13028] ? ksys_write+0x19f/0x250 [ 358.172064][T13028] ? __ia32_sys_read+0xb0/0xb0 03:27:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xa000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x74}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 358.176830][T13028] ? __ia32_sys_clock_settime+0x260/0x260 [ 358.182564][T13028] __x64_sys_getsockopt+0xba/0x150 [ 358.187689][T13028] ? lockdep_hardirqs_on+0x417/0x5d0 [ 358.192994][T13028] do_syscall_64+0xf6/0x790 [ 358.197513][T13028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.203413][T13028] RIP: 0033:0x45c679 [ 358.207756][T13028] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.227372][T13028] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 358.235888][T13028] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 358.243872][T13028] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 358.251857][T13028] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 358.259839][T13028] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 358.267812][T13028] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000007 03:27:48 executing program 5 (fault-call:4 fault-nth:8): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffffff5, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xf000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xe000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:48 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="84004000", @ANYRES16=r0, @ANYBLOB="040027bd7000fddbdf25080000002400078008000100020000000c000400ff7f0000000000000c00040001000000000000004c0004801c000780080001000e000000080003000600000008000100040000000900010073797a31000000001300010062726f6164636173742d6c696e6b00000900010073797a3000000000"], 0x84}, 0x1, 0x0, 0x0, 0x8c4}, 0x4040004) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xfffffffc, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:48 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x85000, &(0x7f0000000280)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, 'user]\''}}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@debug={'debug', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'security#'}}, {@uname={'uname'}}, {@version_9p2000='version=9p2000'}], [{@fsname={'fsname', 0x3d, '/dev/nullb0\x00'}}]}}) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) [ 358.866423][T13071] FAULT_INJECTION: forcing a failure. [ 358.866423][T13071] name failslab, interval 1, probability 0, space 0, times 0 [ 358.957235][T13071] CPU: 0 PID: 13071 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 358.967175][T13071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.977239][T13071] Call Trace: [ 358.980667][T13071] dump_stack+0x188/0x20d [ 358.985025][T13071] should_fail.cold+0x5/0x14 [ 358.989631][T13071] ? setup_fault_attr+0x1e0/0x1e0 [ 358.994683][T13071] should_failslab+0x5/0xf [ 358.999112][T13071] kmem_cache_alloc+0x29b/0x730 03:27:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x34000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) [ 359.003980][T13071] ? find_held_lock+0x2d/0x110 [ 359.008759][T13071] __d_alloc+0x2b/0x8d0 [ 359.012930][T13071] d_alloc_pseudo+0x19/0x70 [ 359.017446][T13071] alloc_file_pseudo+0xc6/0x250 [ 359.022318][T13071] ? alloc_file+0x4d0/0x4d0 [ 359.026835][T13071] ? do_raw_spin_unlock+0x171/0x260 [ 359.032047][T13071] ? _raw_spin_unlock+0x24/0x40 [ 359.036901][T13071] ? __alloc_fd+0x46d/0x600 [ 359.041436][T13071] sock_alloc_file+0x4f/0x190 [ 359.046128][T13071] sctp_getsockopt_peeloff_common.isra.0+0xd1/0x240 [ 359.052730][T13071] ? sctp_do_peeloff+0x410/0x410 03:27:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x3f000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 359.057680][T13071] ? __might_fault+0x190/0x1d0 [ 359.062462][T13071] sctp_getsockopt+0x1a60/0x70f3 [ 359.067419][T13071] ? __lock_acquire+0x827/0x5270 [ 359.072375][T13071] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 359.079241][T13071] ? __lock_acquire+0x827/0x5270 [ 359.084190][T13071] ? find_held_lock+0x2d/0x110 [ 359.088960][T13071] ? __fget_files+0x307/0x4f0 [ 359.093656][T13071] ? lock_downgrade+0x7f0/0x7f0 [ 359.098535][T13071] ? rcu_read_lock_held_common+0x130/0x130 [ 359.104367][T13071] ? aa_label_sk_perm+0x89/0xe0 [ 359.109237][T13071] ? aa_sk_perm+0x319/0xac0 [ 359.113754][T13071] ? do_dup2+0x520/0x520 [ 359.118009][T13071] ? aa_af_perm+0x260/0x260 [ 359.122542][T13071] ? __sys_getsockopt+0x14b/0x2e0 [ 359.127565][T13071] __sys_getsockopt+0x14b/0x2e0 [ 359.132427][T13071] ? kernel_accept+0x360/0x360 [ 359.137215][T13071] ? fput_many+0x2f/0x1a0 [ 359.141556][T13071] ? ksys_write+0x19f/0x250 [ 359.146088][T13071] ? __ia32_sys_read+0xb0/0xb0 [ 359.150859][T13071] ? __ia32_sys_clock_settime+0x260/0x260 [ 359.156595][T13071] __x64_sys_getsockopt+0xba/0x150 [ 359.161715][T13071] ? lockdep_hardirqs_on+0x417/0x5d0 [ 359.167005][T13071] do_syscall_64+0xf6/0x790 [ 359.171519][T13071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.177413][T13071] RIP: 0033:0x45c679 [ 359.181317][T13071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.200935][T13071] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 359.209361][T13071] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 359.217340][T13071] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 359.225317][T13071] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 359.233298][T13071] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 359.241274][T13071] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000008 03:27:49 executing program 5 (fault-call:4 fault-nth:9): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)="ceab681abddb96b0b2f3c84ce782c404e51da98f583f0f6b768f9f99c137c84df4cec2c0cac3e514542e76ef0e921fa2ddece623c6fc7e343ee01b11edddc1793d84d497e13b1e2ce267f4f2fb86b50d84526ca85cf5194ac0353e7af60ce4ee600892a38fc2f0c345fe829847854a95dfdd6825b299a91c7c3948d1dc3eec39cc7d3d470a4a440dbc27880d8166dab9a188e014893bd334a7d40a9140b29a", 0x9f, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)=@secondary='builtin_and_secondary_trusted\x00') open(&(0x7f00000002c0)='./file0\x00', 0x12000, 0x1) 03:27:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x60000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0xffffffff, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x400300, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x9effffff, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x35}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c}, 0x64) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="0000f9ff009e2e17085f2e624be42bb9d1592854e479ebf2785833a1391e4275f532cae191d1b2fa110a30a82bf9cf2aba1da649b4910a64efdad010af04619725dcacc8fae8d10b00000000000000000000000000000026d1ef57dbef924347f7e42594a9e5740a359668f9bc61ef3930a71d7cf0d113691af4114334b58c5cf7bc"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='coda\x00', 0x10000, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x7, &(0x7f0000000500)=[{&(0x7f00000000c0)="33527a790acad784e9c94844be1e84305f507c77e6791694417ab7323539e668c57d7e20fc0c83555b1c50c9cee7208f345d87d18222bcc126951eb124d22bb2a44d4ab78daa5a8e299126c405a59a6ba3a0a572c04e64904b0bbd85f0e17aaf02d28e5bba632580abebe7648fa53a05", 0x70, 0x3f}, {&(0x7f0000000200)="76ac9f9af4063c3c2126fba49eaa80862375f0b683fa0b2ed877748da6dda5e86b0f0a7075217003fd2145d98a475c8780b4dfe10a2d071b039c475e8f1ea70c64cdd2f94995e678b973fb7e348fa671258c35aa77ed82ce42f2774a3b871e788c5368f7d9fdada9c8dd7bed45774f2f484efb098a397a17190f762a328ca0d5342240517ea70670c83b6be0e3f6e8bf4cb952749b7975f3f8", 0x99, 0xfffffffffffffbff}, {&(0x7f0000000140), 0x0, 0xff}, {&(0x7f00000002c0)="a939e058278e0b60ab28f5fae4205b0de32f4952da518ea9e9f90d6cf5d7c45657ba9efc44c1001918c42739595bce0afa52b78443dbe6fa44209077888f057a52f2f3523bce", 0x46}, {&(0x7f0000000340)="676e392388d71a5407639dd77717437fcf5c1892e01d82de8369c6220288a316dbc78484b333bc5a581dc5c1153bbec8738b05c2d40e6b94de51100d5bbc1ea59cb2ab0e24ab9655e79972a699", 0x4d, 0x9}, {&(0x7f00000003c0)="86930052384fc916f0891325d6a5e09db8dcc69b5abe364e8ef6b346ea83204e4e486235e85fab7ab1db3f995f51646b73681d2ba60a99adcf5b8bdf2c48529ba876b3893fd411633cd8976871a6416838de11d730e50c45f5a2cad77142520f0d8dd1fe16ddeacd58138ec788b0bb7ab24883b7f087d0b6dd225e60fc9f63b705bb6f02f5783c1e24e1a9092a52a0803a6fa79cc5942da789f87ab3d36699e17f3b80cd889a047e757fe1f400767e90e7336d0a6e043c6adb3f3fb36e647abc78e4f46b1ed64abe67ab74ca51527ed45306b2a090a73bf2d5a6d5eece6972de13dcc4e21f5ec25f2cb9db63", 0xec, 0x9}, {&(0x7f00000004c0)="281ace338bbd5e8ead015615d08fcf967db9773facab2db32919", 0x1a, 0x8}], 0x40, &(0x7f00000005c0)={[{@integrity='integrity'}, {@usrquota='usrquota'}, {@integrity='integrity'}, {@grpquota='grpquota'}], [{@hash='hash'}]}) 03:27:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 359.613154][T13113] FAULT_INJECTION: forcing a failure. [ 359.613154][T13113] name failslab, interval 1, probability 0, space 0, times 0 [ 359.690102][T13113] CPU: 0 PID: 13113 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 359.700025][T13113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.710091][T13113] Call Trace: [ 359.713403][T13113] dump_stack+0x188/0x20d [ 359.717761][T13113] should_fail.cold+0x5/0x14 [ 359.722373][T13113] ? setup_fault_attr+0x1e0/0x1e0 [ 359.727424][T13113] should_failslab+0x5/0xf [ 359.731849][T13113] kmem_cache_alloc+0x29b/0x730 [ 359.736720][T13113] ? lock_downgrade+0x7f0/0x7f0 [ 359.741587][T13113] __alloc_file+0x21/0x340 [ 359.746022][T13113] alloc_empty_file+0x6d/0x170 [ 359.750797][T13113] alloc_file+0x5e/0x4d0 [ 359.755094][T13113] alloc_file_pseudo+0x165/0x250 [ 359.760041][T13113] ? alloc_file+0x4d0/0x4d0 [ 359.764558][T13113] ? do_raw_spin_unlock+0x171/0x260 [ 359.769794][T13113] ? _raw_spin_unlock+0x24/0x40 [ 359.774677][T13113] ? __alloc_fd+0x46d/0x600 [ 359.779200][T13113] sock_alloc_file+0x4f/0x190 [ 359.783896][T13113] sctp_getsockopt_peeloff_common.isra.0+0xd1/0x240 [ 359.790482][T13113] ? sctp_do_peeloff+0x410/0x410 [ 359.795423][T13113] ? __might_fault+0x190/0x1d0 [ 359.800198][T13113] sctp_getsockopt+0x1a60/0x70f3 [ 359.805142][T13113] ? __lock_acquire+0x827/0x5270 [ 359.810085][T13113] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 359.816926][T13113] ? __lock_acquire+0x827/0x5270 [ 359.821887][T13113] ? find_held_lock+0x2d/0x110 [ 359.826651][T13113] ? __fget_files+0x307/0x4f0 [ 359.831331][T13113] ? lock_downgrade+0x7f0/0x7f0 [ 359.836185][T13113] ? rcu_read_lock_held_common+0x130/0x130 [ 359.841997][T13113] ? aa_label_sk_perm+0x89/0xe0 [ 359.846850][T13113] ? aa_sk_perm+0x319/0xac0 [ 359.851366][T13113] ? do_dup2+0x520/0x520 [ 359.855609][T13113] ? aa_af_perm+0x260/0x260 [ 359.860132][T13113] ? __sys_getsockopt+0x14b/0x2e0 [ 359.865151][T13113] __sys_getsockopt+0x14b/0x2e0 [ 359.870020][T13113] ? kernel_accept+0x360/0x360 [ 359.874795][T13113] ? fput_many+0x2f/0x1a0 [ 359.879119][T13113] ? ksys_write+0x19f/0x250 [ 359.883619][T13113] ? __ia32_sys_read+0xb0/0xb0 [ 359.888373][T13113] ? __ia32_sys_clock_settime+0x260/0x260 [ 359.894111][T13113] __x64_sys_getsockopt+0xba/0x150 [ 359.899234][T13113] ? lockdep_hardirqs_on+0x417/0x5d0 [ 359.904523][T13113] do_syscall_64+0xf6/0x790 [ 359.909033][T13113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.914922][T13113] RIP: 0033:0x45c679 [ 359.918813][T13113] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.938418][T13113] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 359.946850][T13113] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 359.954815][T13113] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 359.962781][T13113] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 359.970741][T13113] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 359.978728][T13113] R13: 00000000000001a4 R14: 00000000004d2250 R15: 0000000000000009 03:27:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xdb000000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:49 executing program 5 (fault-call:4 fault-nth:10): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf0ffffff, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xf0ffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 360.160595][T13125] jfs: Unrecognized mount option "hash" or missing value 03:27:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xf5ffffff, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 360.315901][T13148] FAULT_INJECTION: forcing a failure. [ 360.315901][T13148] name failslab, interval 1, probability 0, space 0, times 0 03:27:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 360.406262][T13148] CPU: 0 PID: 13148 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 360.416196][T13148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.426253][T13148] Call Trace: [ 360.429548][T13148] dump_stack+0x188/0x20d [ 360.433888][T13148] should_fail.cold+0x5/0x14 [ 360.438482][T13148] ? setup_fault_attr+0x1e0/0x1e0 [ 360.443572][T13148] should_failslab+0x5/0xf [ 360.447985][T13148] kmem_cache_alloc+0x29b/0x730 [ 360.452840][T13148] ? kmem_cache_alloc+0x358/0x730 [ 360.457869][T13148] security_file_alloc+0x34/0x160 [ 360.462900][T13148] __alloc_file+0xd8/0x340 [ 360.467314][T13148] alloc_empty_file+0x6d/0x170 [ 360.472087][T13148] alloc_file+0x5e/0x4d0 [ 360.476345][T13148] alloc_file_pseudo+0x165/0x250 [ 360.481313][T13148] ? alloc_file+0x4d0/0x4d0 [ 360.485843][T13148] ? do_raw_spin_unlock+0x171/0x260 [ 360.491047][T13148] ? _raw_spin_unlock+0x24/0x40 [ 360.495890][T13148] ? __alloc_fd+0x46d/0x600 [ 360.500402][T13148] sock_alloc_file+0x4f/0x190 [ 360.505086][T13148] sctp_getsockopt_peeloff_common.isra.0+0xd1/0x240 [ 360.511668][T13148] ? sctp_do_peeloff+0x410/0x410 [ 360.516606][T13148] ? __might_fault+0x190/0x1d0 [ 360.521377][T13148] sctp_getsockopt+0x1a60/0x70f3 [ 360.526314][T13148] ? __lock_acquire+0x827/0x5270 [ 360.531257][T13148] ? sctp_getsockopt_peeloff_common.isra.0+0x240/0x240 [ 360.538101][T13148] ? __lock_acquire+0x827/0x5270 [ 360.543039][T13148] ? find_held_lock+0x2d/0x110 [ 360.547818][T13148] ? __fget_files+0x307/0x4f0 [ 360.552497][T13148] ? lock_downgrade+0x7f0/0x7f0 [ 360.557367][T13148] ? rcu_read_lock_held_common+0x130/0x130 [ 360.563200][T13148] ? aa_label_sk_perm+0x89/0xe0 [ 360.568053][T13148] ? aa_sk_perm+0x319/0xac0 [ 360.572575][T13148] ? do_dup2+0x520/0x520 [ 360.576815][T13148] ? aa_af_perm+0x260/0x260 [ 360.581339][T13148] ? __sys_getsockopt+0x14b/0x2e0 [ 360.586356][T13148] __sys_getsockopt+0x14b/0x2e0 [ 360.591224][T13148] ? kernel_accept+0x360/0x360 [ 360.595987][T13148] ? fput_many+0x2f/0x1a0 [ 360.600407][T13148] ? ksys_write+0x19f/0x250 [ 360.604940][T13148] ? __ia32_sys_read+0xb0/0xb0 [ 360.609703][T13148] ? __ia32_sys_clock_settime+0x260/0x260 [ 360.615427][T13148] __x64_sys_getsockopt+0xba/0x150 [ 360.620544][T13148] ? lockdep_hardirqs_on+0x417/0x5d0 [ 360.625832][T13148] do_syscall_64+0xf6/0x790 [ 360.630340][T13148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.636511][T13148] RIP: 0033:0x45c679 [ 360.640405][T13148] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.660006][T13148] RSP: 002b:00007fd39a84fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 360.668411][T13148] RAX: ffffffffffffffda RBX: 00007fd39a8506d4 RCX: 000000000045c679 [ 360.676374][T13148] RDX: 0000000000000066 RSI: 0000000000000084 RDI: 0000000000000003 [ 360.684363][T13148] RBP: 000000000076bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 360.692339][T13148] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 03:27:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 360.700304][T13148] R13: 00000000000001a4 R14: 00000000004d2250 R15: 000000000000000a 03:27:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x1000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) dup(r1) r2 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000000c0)=""/111) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x140800, 0x0) 03:27:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xfcffffff, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:50 executing program 5 (fault-call:4 fault-nth:11): r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xfffff000, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x2000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=@known='trusted.syz\x00', &(0x7f00000002c0)=""/234, 0xea) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r0 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) accept(r0, &(0x7f00000003c0)=@hci, &(0x7f0000000440)=0x80) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x2000000, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x4}}, {@common=@version_u='version=9p2000.u'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'em0%:'}}]}}) 03:27:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xffffff7f, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0xe}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x74}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xffffff9e, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/nul\b\x000\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x3000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0xf}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xfffffff0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x60}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x0, 0x0) 03:27:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xfffffff5, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x4000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x72}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x106, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:52 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006e80)=[{{&(0x7f00000000c0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/219, 0xdb}, {&(0x7f0000000300)=""/207, 0xcf}, {&(0x7f0000000400)=""/132, 0x84}, {&(0x7f0000000000)=""/64, 0x40}], 0x4, &(0x7f00000004c0)=""/176, 0xb0}, 0x2}, {{&(0x7f0000000580)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/135, 0x87}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/240, 0xf0}, {&(0x7f0000001880)=""/136, 0x88}, {&(0x7f0000001940)=""/127, 0x7f}, {&(0x7f00000019c0)=""/170, 0xaa}, {&(0x7f0000001a80)=""/133, 0x85}, {&(0x7f0000001b40)=""/75, 0x4b}, {&(0x7f0000001bc0)=""/57, 0x39}], 0xa, &(0x7f0000001cc0)=""/23, 0x17}, 0xd3}, {{&(0x7f0000001d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002200)=[{&(0x7f0000001d80)=""/24, 0x18}, {&(0x7f0000001dc0)=""/42, 0x2a}, {&(0x7f0000001e00)=""/158, 0x9e}, {&(0x7f0000001ec0)=""/58, 0x3a}, {&(0x7f0000001f00)=""/180, 0xb4}, {&(0x7f0000001fc0)=""/112, 0x70}, {&(0x7f0000002040)=""/167, 0xa7}, {&(0x7f0000002100)=""/42, 0x2a}, {&(0x7f0000002140)=""/143, 0x8f}], 0x9, &(0x7f00000022c0)=""/4096, 0x1000}}, {{&(0x7f00000032c0)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004900)=[{&(0x7f0000003340)=""/198, 0xc6}, {&(0x7f0000003440)=""/106, 0x6a}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/136, 0x88}, {&(0x7f0000004580)=""/255, 0xff}, {&(0x7f0000004680)=""/83, 0x53}, {&(0x7f0000004700)=""/249, 0xf9}, {&(0x7f0000004800)=""/184, 0xb8}, {&(0x7f00000048c0)=""/64, 0x40}], 0x9, &(0x7f00000049c0)=""/207, 0xcf}}, {{&(0x7f0000004ac0)=@un=@abs, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000004b40)=""/126, 0x7e}, {&(0x7f0000004bc0)=""/221, 0xdd}, {&(0x7f0000004cc0)=""/33, 0x21}, {&(0x7f0000004d00)=""/146, 0x92}], 0x4, &(0x7f0000004e00)=""/205, 0xcd}, 0x9}, {{0x0, 0x0, &(0x7f0000005280)=[{&(0x7f0000004f00)=""/130, 0x82}, {&(0x7f0000004fc0)=""/219, 0xdb}, {&(0x7f00000050c0)=""/52, 0x34}, {&(0x7f0000005100)=""/103, 0x67}, {&(0x7f0000005180)=""/24, 0x18}, {&(0x7f00000051c0)=""/175, 0xaf}], 0x6, &(0x7f0000005300)=""/232, 0xe8}, 0x7}, {{&(0x7f0000005400)=@vsock, 0x80, &(0x7f0000005880)=[{&(0x7f0000005480)=""/140, 0x8c}, {&(0x7f0000005540)=""/165, 0xa5}, {&(0x7f0000005600)=""/166, 0xa6}, {&(0x7f00000056c0)=""/255, 0xff}, {&(0x7f00000057c0)=""/173, 0xad}], 0x5, &(0x7f0000005900)=""/7, 0x7}, 0x8}, {{&(0x7f0000005940)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000006dc0)=[{&(0x7f00000059c0)=""/249, 0xf9}, {&(0x7f0000005ac0)=""/90, 0x5a}, {&(0x7f0000005b40)=""/39, 0x27}, {&(0x7f0000005b80)=""/165, 0xa5}, {&(0x7f0000005c40)=""/206, 0xce}, {&(0x7f0000005d40)=""/4096, 0x1000}, {&(0x7f0000006d40)=""/96, 0x60}], 0x7, &(0x7f0000006e40)=""/52, 0x34}, 0x6}], 0x8, 0x40000042, &(0x7f0000007080)={0x77359400}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/raw6\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000000540)=""/159, 0x200005df}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000070c0)={0xfff}, 0x4) 03:27:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xfffffffc, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xa000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0xffffffff, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:52 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x8800, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000200)={0xfff, 0x1, {0xffffffffffffffff}, {0xee00}, 0x1, 0x3}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000240)=r1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x1000, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x2}, 0x16, 0x3) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r2 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000280)=0x7f) 03:27:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xe000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x2, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:53 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f645a0d411476bc94ac3004"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000740)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x6, &(0x7f0000000580)=[{&(0x7f0000000100)="c37e913548a7b44462e8ded7733daa7826141c5b0d2060fbcdf0c78d4534138769473baaa260eda1dc3028778aa7461c9612777c957e59c1d3a1", 0x3a, 0x5}, {&(0x7f0000000140)="09ce6f3be9ebded88fe1496f425a67510273e753f25a56d0b7fec44bbb6e78203a50b70e379f5f6376aeb6f96e5a1779b33a9328", 0x34, 0x2}, {&(0x7f0000000200)="8443072952d1b9be4f80642543629b0d0ca4790400139694a6515da8a155d26dcb4e17b889b67f517cfea713695d8046d3f3a042440b6918be597b87be98865f982bee9949b040583eb8322bafd152d8347738654e30afaccb73baf569f35f52ead37d509c0721287aa1c1155dcebbe9149488beca12ea1439c874357f7bb5036f5e6166ec3995f7deb2f0b0700ba833d29c03", 0x93, 0xff}, {&(0x7f00000002c0)="974a2cd75041f5e3b366ed0a76dcd31899ec528050ed50856749c575087f347fc23cf9bbc6a06a13b32f06218fdc0809e2552e07ae61bcd6b52870aee35318978d0affd032bf5229db9a597b90f1a760085d68fa6a821615ac423a130bbc72790c6b319e0cc295af2b40400cc79fb34bc22b8458bb17b8acce63a05eb5beeee0850aca4142a26b0b210f84d524c4d74c38b69e4cb8d9a1353bb8e31f8ace68b43cbca758d022140859e36f0b330514e326fe2f9b7d161e1b55258979ce990ca4fb03ff01501fdc0d4929fc356ea416cb4392686c2e4c748354897bc1e002301d9ed9f37b9cb0cd0b38db4ca51ccf", 0xee, 0x10001}, {&(0x7f00000003c0)="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", 0xfc, 0x6}, {&(0x7f00000004c0)="f30afe9856ea52ba379d8cc48245418016160911150e5a84e3c77f40a3feacdc2cf75b0170c2913d5571386bd9f812fc47c3918e715d6d85b87f8b2004f4cd685692b208e36ddf5ed76de57b1d1d90d456c431dacfb658f51290db103924995b5e7e0127862fc5ad4432b403c1ecdf2b026b436f098661a3503a9b7f0370c9215ef55ba877208ba3f0a95bb166925bc8c34cb2932a43dc1b52ad2d93345515264bb6", 0xa2, 0x6}], 0x10000, &(0x7f0000000780)={[{@nonumtail='nnonumtail=1'}, {@shortname_mixed='shortname=mixed'}, {@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x8000}}, {@fat=@flush='flush'}, {@rodir='rodir'}, {@rodir='rodir'}, {@uni_xlateno='uni_xlate=0'}, {@shortname_lower='shortname=lower'}], [{@fsname={'fsname', 0x3d, '/dev/nullb0\x00'}}, {@fowner_lt={'fowner<', r0}}, {@measure='measure'}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '{ppp0em1eth1'}}]}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x9}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000a00)={0x6, 'dummy0\x00', {0x2}, 0x602f}) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001000080000000000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aca6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x48, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) setsockopt$bt_hci_HCI_TIME_STAMP(r10, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r10, 0x551f) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r10, &(0x7f0000001040)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x50, 0x140b, 0x400, 0xfffff0fd, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x5}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x80) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) process_vm_writev(0x0, &(0x7f0000000e00)=[{&(0x7f0000000a40)=""/136, 0x88}, {&(0x7f0000000b00)=""/191, 0xbf}, {&(0x7f0000000bc0)=""/193, 0xc1}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/255, 0xff}], 0x5, &(0x7f0000000f40)=[{&(0x7f0000000e80)=""/143, 0x8f}], 0x1, 0x0) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f00000008c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000900)={{{@in=@rand_addr=0x80000001, @in6=@rand_addr="6b7d0725888f3089c06d360662a91936", 0x4e20, 0x0, 0x4e20, 0x84, 0xa, 0x0, 0x0, 0x16, r8, r12}, {0x4, 0xffffffff, 0x1ff, 0x8001, 0x5, 0xfffffffffffffe00, 0xb773, 0x3}, {0x8, 0x4203, 0x80, 0x9}, 0x200, 0x0, 0x0, 0x1, 0x1, 0x2}, {{@in6=@empty, 0x4d3, 0x6c}, 0xa, @in=@multicast1, 0x3507, 0x3, 0x3, 0x3, 0x0, 0x1, 0xfffffffb}}, 0xe8) 03:27:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x34010000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x2, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) [ 363.925436][T13319] FAT-fs (loop3): Unrecognized mount option "nnonumtail=1" or missing value 03:27:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x3, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0xe}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x3f000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x3, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x4, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000280)={0x9e0000, 0x7, 0x20, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x9a0913, 0x0, [], @p_u32=&(0x7f0000000140)=0xfffffffb}}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) dup2(r3, r2) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000002c0)) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x42840, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f00000000c0)={0x1, 0x0, 0x2}) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000040)=@sr0='/dev/sr0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) finit_module(r5, &(0x7f0000000100)='\x00', 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000000300)) 03:27:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x60000000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7400}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x60}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x7, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:54 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f646576bf276e756c6cfd4fc2cf9cbbd9d76232"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x6d, 0x5, 0x5, 0x7, 0x2, 0x5, 0xff, 0xfb, 0x4, 0x81, 0xff, 0x3, 0x0, 0xb9, 0xb2, 0x5}}) 03:27:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0x9effffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf000}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x4, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0xa, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x72}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000100)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='ext4\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) setsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000040)=0x2, 0x4) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xfffeffff, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 03:27:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xc00e0000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 03:27:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x3}]}, 0x1c}}, 0x0) [ 365.855947][T13409] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem 03:27:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0xe, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xf0ffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) [ 365.899722][T13409] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem 03:27:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x14c0, 0x0) [ 366.001767][T13421] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:27:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:27:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x8}]}, 0x1c}}, 0x0) 03:27:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0xf, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:55 executing program 3: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0xa10000, 0x9, 0x4, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990af5, 0x80000000, [], @string=&(0x7f0000000000)=0x20}}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) mknod$loop(&(0x7f0000000080)='./file1\x00', 0x1000, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup\x00', 0x0, 0x0) 03:27:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000400)={0x0, 0xfffff000, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) [ 366.340875][T13444] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:27:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x2}]}, 0x1c}}, 0x0) 03:27:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x60, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 03:27:56 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000080)) ptrace(0x4206, r0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x6, 0x81, {r0}, {0xffffffffffffffff}, 0x8, 0x5}) r2 = socket(0x10, 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r2}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r4) lchown(&(0x7f0000000000)='./file0\x00', r1, r4) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='exfat\x00', 0x0, 0x0) 03:27:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:27:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x5}]}, 0x1c}}, 0x0) [ 366.761281][T13470] [EXFAT] trying to mount... [ 366.789551][ T2623] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 366.816411][T13470] ------------[ cut here ]------------ [ 366.846273][T13470] [EXFAT] No bh, device seems wrong or to be ejected. [ 366.869743][T13470] WARNING: CPU: 0 PID: 13470 at drivers/staging/exfat/exfat_blkdev.c:62 exfat_bdev_read+0x24a/0x2b0 [ 366.880532][T13470] Kernel panic - not syncing: panic_on_warn set ... [ 366.887153][T13470] CPU: 0 PID: 13470 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 366.897054][T13470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.907110][T13470] Call Trace: [ 366.910415][T13470] dump_stack+0x188/0x20d [ 366.914762][T13470] ? exfat_bdev_read+0x190/0x2b0 [ 366.919767][T13470] panic+0x2e3/0x75c [ 366.923674][T13470] ? add_taint.cold+0x16/0x16 [ 366.928426][T13470] ? __probe_kernel_read+0x188/0x1d0 [ 366.933728][T13470] ? __warn.cold+0x14/0x35 [ 366.938157][T13470] ? exfat_bdev_read+0x24a/0x2b0 [ 366.943118][T13470] __warn.cold+0x2f/0x35 [ 366.947366][T13470] ? exfat_bdev_read+0x24a/0x2b0 [ 366.952351][T13470] report_bug+0x27b/0x2f0 [ 366.956772][T13470] do_error_trap+0x12b/0x220 [ 366.961383][T13470] ? exfat_bdev_read+0x24a/0x2b0 [ 366.966337][T13470] do_invalid_op+0x32/0x40 [ 366.970760][T13470] ? exfat_bdev_read+0x24a/0x2b0 [ 366.975707][T13470] invalid_op+0x23/0x30 [ 366.979872][T13470] RIP: 0010:exfat_bdev_read+0x24a/0x2b0 [ 366.985425][T13470] Code: 00 00 31 ff 41 bc fb ff ff ff 89 de e8 4f 09 9a fb 85 db 0f 85 5d ff ff ff e8 d2 07 9a fb 48 c7 c7 60 ef cd 88 e8 3e d3 6b fb <0f> 0b e9 45 ff ff ff e8 4a 28 d7 fb e9 ad fe ff ff e8 20 28 d7 fb [ 367.005037][T13470] RSP: 0018:ffffc900027a7b38 EFLAGS: 00010286 [ 367.011127][T13470] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 367.019139][T13470] RDX: 0000000000038eff RSI: ffffffff815c4e91 RDI: fffff520004f4f59 [ 367.027129][T13470] RBP: ffffc900027a7c70 R08: ffff888054e5c040 R09: ffffed1015cc6661 [ 367.035103][T13470] R10: ffffed1015cc6660 R11: ffff8880ae633307 R12: 00000000fffffffb [ 367.043087][T13470] R13: ffff888052ea0000 R14: 0000000000000001 R15: 0000000000000000 [ 367.051201][T13470] ? vprintk_func+0x81/0x17e [ 367.055821][T13470] ? exfat_bdev_read+0x24a/0x2b0 [ 367.060830][T13470] sector_read+0x13a/0x1e0 [ 367.065251][T13470] exfat_fill_super.cold+0x2e4/0x895 [ 367.070551][T13470] ? exfat_read_root+0x8f0/0x8f0 [ 367.075488][T13470] ? snprintf+0xbb/0xf0 [ 367.079678][T13470] ? wait_for_completion+0x3c0/0x3c0 [ 367.085046][T13470] ? set_blocksize+0x24f/0x2c0 [ 367.089842][T13470] mount_bdev+0x305/0x3c0 [ 367.094195][T13470] ? exfat_read_root+0x8f0/0x8f0 [ 367.099139][T13470] ? exfat_remount+0x50/0x50 [ 367.103790][T13470] legacy_get_tree+0x105/0x220 [ 367.108543][T13470] ? ns_capable_common+0xe2/0x100 [ 367.113596][T13470] vfs_get_tree+0x89/0x2f0 [ 367.118002][T13470] do_mount+0x1306/0x1a60 [ 367.122319][T13470] ? copy_mount_string+0x40/0x40 [ 367.127243][T13470] ? __might_fault+0x190/0x1d0 [ 367.132016][T13470] ? _copy_from_user+0x123/0x190 [ 367.136950][T13470] ? memdup_user+0x7c/0xd0 [ 367.141367][T13470] __x64_sys_mount+0x18f/0x230 [ 367.146124][T13470] do_syscall_64+0xf6/0x790 [ 367.150623][T13470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.156551][T13470] RIP: 0033:0x45c679 [ 367.160543][T13470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.180165][T13470] RSP: 002b:00007f9605c0dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 367.188567][T13470] RAX: ffffffffffffffda RBX: 00007f9605c0e6d4 RCX: 000000000045c679 [ 367.196517][T13470] RDX: 00000000200001c0 RSI: 0000000020000180 RDI: 0000000020000040 [ 367.204466][T13470] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 367.212516][T13470] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 367.220486][T13470] R13: 000000000000074a R14: 00000000004c9f51 R15: 000000000076bf0c [ 367.229751][T13470] Kernel Offset: disabled [ 367.234181][T13470] Rebooting in 86400 seconds..