[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 29.088614] kauditd_printk_skb: 8 callbacks suppressed [ 29.088634] audit: type=1800 audit(1543926003.904:29): pid=5894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 29.121082] audit: type=1800 audit(1543926003.904:30): pid=5894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts. 2018/12/04 12:20:12 fuzzer started 2018/12/04 12:20:14 dialing manager at 10.128.0.26:45003 2018/12/04 12:20:14 syscalls: 1 2018/12/04 12:20:14 code coverage: enabled 2018/12/04 12:20:14 comparison tracing: enabled 2018/12/04 12:20:14 setuid sandbox: enabled 2018/12/04 12:20:14 namespace sandbox: enabled 2018/12/04 12:20:14 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/04 12:20:14 fault injection: enabled 2018/12/04 12:20:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/04 12:20:14 net packet injection: enabled 2018/12/04 12:20:14 net device setup: enabled 12:23:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='syzkaller0\x00') socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000028c0)={'ip6gre0\x00', @ifru_addrs=@in={0x2, 0x4e20}}) syzkaller login: [ 219.068072] IPVS: ftp: loaded support on port[0] = 21 12:23:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002ff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000200000000000000000000008e15adecfc04aba1"], 0x1}}, 0x0) [ 219.382595] IPVS: ftp: loaded support on port[0] = 21 12:23:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 219.700600] IPVS: ftp: loaded support on port[0] = 21 12:23:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x22, &(0x7f0000000000), 0x20a154cc) [ 220.119018] IPVS: ftp: loaded support on port[0] = 21 12:23:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000280005000000000000000000040000000c000100000000ffffffff004b6699a769bc95bea835ce329c3c602f8bbde740c2f697f546db731ef36dd3f8004fb44b585be8bc134bacc8258c0b98d504159518306c61d2cb3d07af08edca856651c985304ee0ec29415fa0e48f70fd63"], 0x1}}, 0x0) [ 220.578253] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.585641] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.598916] device bridge_slave_0 entered promiscuous mode [ 220.759964] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.767713] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.775235] device bridge_slave_1 entered promiscuous mode [ 220.786344] IPVS: ftp: loaded support on port[0] = 21 [ 220.934071] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 12:23:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x7, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 221.127069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.455858] IPVS: ftp: loaded support on port[0] = 21 [ 221.469827] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.476205] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.500730] device bridge_slave_0 entered promiscuous mode [ 221.553003] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.602847] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.609396] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.616860] device bridge_slave_1 entered promiscuous mode [ 221.719014] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.728804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.740873] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.757906] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.781337] device bridge_slave_0 entered promiscuous mode [ 221.837500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.943891] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.951734] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.965925] device bridge_slave_1 entered promiscuous mode [ 222.138474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.244648] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.287554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.317606] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.351625] team0: Port device team_slave_0 added [ 222.410354] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.440112] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.446543] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.463743] device bridge_slave_0 entered promiscuous mode [ 222.525670] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.548038] team0: Port device team_slave_1 added [ 222.573316] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.597432] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.604891] device bridge_slave_1 entered promiscuous mode [ 222.621649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.655665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.692999] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.710592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.758867] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.799043] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.833471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.867985] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.964483] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.981548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.998304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.052470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.059405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.072511] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.079691] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.108373] device bridge_slave_0 entered promiscuous mode [ 223.124667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.136408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.146745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.222196] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.238637] team0: Port device team_slave_0 added [ 223.243900] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.251169] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.266125] device bridge_slave_1 entered promiscuous mode [ 223.342668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.380138] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.408134] team0: Port device team_slave_1 added [ 223.415670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.489815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.501247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.515946] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.531772] team0: Port device team_slave_0 added [ 223.546535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.568633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.576527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.624781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.647664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.655529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.690355] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.714035] team0: Port device team_slave_1 added [ 223.792624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.807764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.815749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.881661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.900338] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.906738] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.942221] device bridge_slave_0 entered promiscuous mode [ 223.953389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.974050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.998006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.010994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.036501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.049527] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.055895] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.089499] device bridge_slave_1 entered promiscuous mode [ 224.119285] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.126542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.148015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.178615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.189006] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.221116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.238636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.246635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.305841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.312907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.336390] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.348370] team0: Port device team_slave_0 added [ 224.355001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.414895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.438472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.493257] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.516345] team0: Port device team_slave_1 added [ 224.657948] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.665106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.684031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.702775] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.709299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.716255] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.722717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.730649] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.766555] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.798645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.867417] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.875979] team0: Port device team_slave_0 added [ 224.890276] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.908259] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.923832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.933737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.020222] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.035904] team0: Port device team_slave_1 added [ 225.046666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.068703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.083632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.108263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.192876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.203220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.219255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.240924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.260068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.266913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.285134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.328028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.457877] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.467577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.475563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.555099] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.561525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.568265] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.574663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.601877] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.613485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.631470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.667818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.691618] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.706649] team0: Port device team_slave_0 added [ 225.820212] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.826601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.833368] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.839780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.866359] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.875644] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.883518] team0: Port device team_slave_1 added [ 226.008354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.077621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.097724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.218062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.224958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.248443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.357067] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.364415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.381636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.498431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.505633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.518267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.552478] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.558937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.565622] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.572063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.600744] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.993513] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.999943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.006606] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.013027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.039490] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.088288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.107728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.958743] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.965177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.971953] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.978370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.993566] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.108817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.315771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.850164] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.090926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.398439] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.404608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.427844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.466267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.533554] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.882518] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.938593] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.989022] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.995168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.002954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.114606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.308786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.453094] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.474276] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.483338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.508436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.650990] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.818401] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.961138] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.135151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.155936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.181020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.188588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.313914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.330919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.339373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.554809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.673813] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.848522] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.022383] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.038579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.049730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.532000] 8021q: adding VLAN 0 to HW filter on device team0 12:23:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0xfffffffffffffffd}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 235.105739] hrtimer: interrupt took 47695 ns 12:23:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031ae85717070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)="2e8ed8656e747300a35ccce14f1af7eb6c0c6f2c1ef093c02ea3bf3a8d989338c9b04c73d2ef0bfc98000000007d2330065f160751d207b93de780bebaee2a23cd3513e5e5bc2a157ebe0fa4c89fdaf080b1a53f84c380", 0x26e1, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="c8", 0x1}], 0x1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x1000}) 12:23:30 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 12:23:30 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0), 0x0) 12:23:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f00000001c0)="580000001500add427323b470c458c5602067fffffff81004e220000f7ff58000b480500945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a100041043d410000fcff93", 0x59}], 0x1) 12:23:30 executing program 1: socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, 0x0) 12:23:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r1) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 12:23:30 executing program 1: 12:23:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:31 executing program 3: 12:23:31 executing program 1: 12:23:31 executing program 5: 12:23:31 executing program 0: 12:23:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:31 executing program 4: 12:23:31 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 12:23:31 executing program 3: 12:23:31 executing program 3: 12:23:31 executing program 0: 12:23:31 executing program 4: 12:23:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:31 executing program 0: 12:23:31 executing program 5: 12:23:31 executing program 1: 12:23:32 executing program 4: 12:23:32 executing program 3: 12:23:32 executing program 5: 12:23:32 executing program 0: 12:23:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:32 executing program 1: 12:23:32 executing program 4: 12:23:32 executing program 5: 12:23:32 executing program 3: 12:23:32 executing program 1: 12:23:32 executing program 0: 12:23:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:32 executing program 4: 12:23:32 executing program 3: 12:23:32 executing program 1: 12:23:32 executing program 0: 12:23:32 executing program 5: 12:23:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:32 executing program 4: 12:23:32 executing program 1: 12:23:32 executing program 3: 12:23:32 executing program 5: 12:23:32 executing program 0: 12:23:32 executing program 4: 12:23:32 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:32 executing program 1: 12:23:32 executing program 3: 12:23:32 executing program 5: 12:23:32 executing program 4: 12:23:32 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:32 executing program 1: 12:23:32 executing program 0: 12:23:32 executing program 5: 12:23:32 executing program 3: 12:23:32 executing program 1: 12:23:32 executing program 4: 12:23:32 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:32 executing program 0: 12:23:33 executing program 3: 12:23:33 executing program 5: 12:23:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 2: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x2e, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x2a, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:33 executing program 5: 12:23:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 2: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 3: 12:23:33 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 12:23:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x3c, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:33 executing program 2: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x2f, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:33 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 5: r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) kcmp(r1, r2, 0x0, r0, 0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) 12:23:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)) 12:23:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:34 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:23:34 executing program 5: r0 = socket(0x10, 0x200000802, 0x0) write(r0, &(0x7f0000000000)="240000001a00255b955021c73ff0006bb404feff141c020b5aff6e10b500000780cc0800", 0x24) 12:23:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x26, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000400) getsockopt$SO_COOKIE(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x8) 12:23:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180), 0xfe0c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)="76656e6f000abf9f4ee04d470684b4ccf746388ee76458a41b904145f047906454182b53ef6da7debb6e5cde8c44882372ad48cc1b94814d4b2af98d02a08a8dc1079230e2e6ac4f7ecaf7e9f0d1be585b5c0e2bb264174a9031018b6a4e00e9330a0944b0a7978e1c3b9f58aab56649cbbbf19462d9fb1d9cf58abdd67d4fe6d40e80d40ff49640460792e856c1f86f505493008ec330cc9fa325ac6385390e84b560a6346f66371e89c2c9fed18ed8d0e77b33991ee1bf34a0c165ec9dfc4c64", 0xc1) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) 12:23:34 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)) r3 = dup2(r2, r1) syz_execute_func(&(0x7f0000000340)="3666440f50f564ff0941c30f0f441e04a4c4c27d794e0066420fe2e33e0f1110c442019dcc6f") clone(0xb102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) 12:23:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, r0, 0x0) 12:23:34 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) 12:23:34 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') write$P9_RMKDIR(r0, 0x0, 0x0) 12:23:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:34 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:35 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) tkill(r1, 0x8001004000000016) 12:23:35 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) 12:23:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:37 executing program 1: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:37 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:37 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) 12:23:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, 0x0) 12:23:37 executing program 1: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:37 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:38 executing program 1: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:38 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x2e11}, 0x8) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) close(r3) socket(0x10, 0x803, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000080)=@in={0x2, 0x0, @empty}, &(0x7f0000000100)=0x80) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000140)={0xa4, 0x429d, 0x3, 0x0, 0x9, 0xfa, 0x3, 0x80000000, 0x100000000, 0x2f3, 0x1ff}, 0xb) 12:23:38 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:38 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:38 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 244.086506] sctp: failed to load transform for md5: -2 12:23:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 244.245519] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:39 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 244.808035] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:39 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 245.059021] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 245.643561] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 246.649771] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 247.389162] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 247.610151] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 247.877155] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, 0x0) 12:23:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x0, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:42 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:43 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x0, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 248.165300] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, 0x0) 12:23:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x19, 0x0, 0x0) 12:23:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x0, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 248.435808] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x2e11}, 0x8) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) recvmmsg(r3, &(0x7f0000005680)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1}}, {{&(0x7f00000006c0)=@xdp, 0x80, &(0x7f0000000740)=[{&(0x7f0000000a40)=""/4096, 0x18e90}], 0x1}}, {{&(0x7f0000001fc0)=@hci, 0x80, &(0x7f00000009c0)=[{&(0x7f0000002040)=""/4096, 0x1000}], 0x1, &(0x7f0000003040)=""/123, 0x7b}}, {{&(0x7f00000033c0)=@generic, 0x80, &(0x7f0000005600)=[{&(0x7f0000003540)=""/4096, 0x1000}], 0x1}}], 0x4, 0x0, &(0x7f0000005840)={0x0, 0x1c9c380}) 12:23:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:43 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 249.118425] sctp: failed to load transform for md5: -2 12:23:44 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) [ 249.262295] validate_nla: 1 callbacks suppressed [ 249.262304] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:44 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_ifreq(r1, 0x8948, &(0x7f00000028c0)={'ip_vti0\x00'}) [ 249.456349] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:44 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, 0x0, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:44 executing program 2: 12:23:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:44 executing program 2: [ 249.927062] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:44 executing program 2: 12:23:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x8, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, 0x0, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 250.168263] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x60, 0x100) 12:23:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, 0x0, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:45 executing program 3: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 250.779934] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0x0, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0x0, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 251.001353] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0x0, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:46 executing program 3: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x13, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, 0x0) 12:23:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x0, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 251.654080] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, 0x0) 12:23:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x0, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 251.863196] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:47 executing program 3: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x8, 0x0, 0x0) 12:23:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x0, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x0, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{}, 0x0, @in6=@remote}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, 0x0) [ 252.543571] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)=0xffffffffffffff73) 12:23:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x0, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, 0x0) 12:23:48 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:48 executing program 1: 12:23:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 12:23:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x0, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, 0x0) 12:23:48 executing program 1: [ 253.378903] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 12:23:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x0, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:48 executing program 1: 12:23:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x13, 0x0, 0x0) 12:23:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:49 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 12:23:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x0, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:49 executing program 1: 12:23:49 executing program 0: 12:23:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x0, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:49 executing program 0: 12:23:49 executing program 1: 12:23:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:49 executing program 1: [ 254.475624] validate_nla: 2 callbacks suppressed [ 254.475633] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:49 executing program 0: 12:23:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x0, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:49 executing program 1: 12:23:49 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:49 executing program 1: 12:23:50 executing program 0: [ 255.143782] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{&(0x7f00000011c0)=@generic, 0x80, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1, &(0x7f00000027c0)=""/243, 0xf3}}], 0x500, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000e40), 0x4) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:23:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:50 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x0, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 255.439410] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:50 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:50 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x11, &(0x7f0000000040)={@empty, @local, [], {@x25}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, 0x0) 12:23:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x0, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:50 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(r0) [ 256.016081] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:50 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:51 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) [ 256.176040] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 256.871190] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:51 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 257.096003] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:52 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:52 executing program 1: ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 257.768988] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:52 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:52 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r0, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 12:23:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 12:23:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 12:23:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:23:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:23:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:23:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, 0x0) 12:23:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:55 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:23:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, 0x0) 12:23:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, 0x0) 12:23:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) 12:23:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:23:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) 12:23:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 12:23:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 12:23:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) 12:23:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 12:23:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000"], 0x2c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") 12:23:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:23:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001000000000000010000000003000000000000000000"], 0x42) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:23:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") 12:23:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000"], 0x4d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") 12:23:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:23:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:58 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:23:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") 12:23:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 263.943023] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 263.943308] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 12:23:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:58 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") 12:23:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000000000"], 0x56) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 264.074479] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 12:23:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:23:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:23:59 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001000000000000010000000003000000000000000000000000120000030000000000000000000000000000"], 0x57) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:23:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") 12:23:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 12:23:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f00000002c0)) [ 264.823770] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 [ 264.824162] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:23:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f00000002c0)) 12:23:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 12:23:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") 12:23:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:23:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 12:23:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f00000002c0)) [ 265.093153] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:23:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100000000000001000000000300000000000000000000000012000003000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 12:24:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 12:24:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") 12:24:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) 12:24:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001000000000000010000000003000000000000000000"], 0x42) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:00 executing program 2 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:24:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) 12:24:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001000000000000010000000003000000000000000000"], 0x42) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x0) 12:24:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") 12:24:00 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 12:24:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 265.951933] FAULT_INJECTION: forcing a failure. [ 265.951933] name failslab, interval 1, probability 0, space 0, times 1 [ 265.999576] CPU: 1 PID: 9304 Comm: syz-executor5 Not tainted 4.20.0-rc5+ #362 [ 266.006889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.016264] Call Trace: [ 266.018979] dump_stack+0x244/0x39d [ 266.022628] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.027882] should_fail.cold.4+0xa/0x17 [ 266.031968] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.037104] ? lock_downgrade+0x900/0x900 [ 266.041338] ? check_preemption_disabled+0x48/0x280 12:24:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 266.046407] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 266.051400] ? kasan_check_read+0x11/0x20 [ 266.055559] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 266.060898] ? __netlink_insert+0xd2c/0x13b0 [ 266.065318] ? __netlink_insert+0xd2c/0x13b0 [ 266.069758] ? find_held_lock+0x36/0x1c0 [ 266.073866] ? wb_wakeup_delayed+0xc8/0xf0 [ 266.073921] ? perf_trace_sched_process_exec+0x860/0x860 [ 266.083570] __should_failslab+0x124/0x180 [ 266.083619] should_failslab+0x9/0x14 [ 266.083639] kmem_cache_alloc_node+0x26e/0x730 12:24:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 266.096821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.102374] ? check_preemption_disabled+0x48/0x280 [ 266.107445] __alloc_skb+0x119/0x770 [ 266.111198] ? netdev_alloc_frag+0x1f0/0x1f0 [ 266.115640] ? __release_sock+0x3a0/0x3a0 [ 266.119836] ? __local_bh_enable_ip+0x160/0x260 [ 266.124531] ? netlink_insert+0xfe/0x240 [ 266.128611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.134162] ? netlink_autobind.isra.34+0x232/0x310 [ 266.139213] netlink_sendmsg+0xb29/0xfc0 [ 266.143307] ? netlink_unicast+0x760/0x760 [ 266.147590] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 266.152548] ? apparmor_socket_sendmsg+0x29/0x30 [ 266.157348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.162932] ? security_socket_sendmsg+0x94/0xc0 [ 266.167721] ? netlink_unicast+0x760/0x760 [ 266.172004] sock_sendmsg+0xd5/0x120 [ 266.175746] ___sys_sendmsg+0x7fd/0x930 [ 266.179755] ? copy_msghdr_from_user+0x580/0x580 [ 266.184527] ? lock_downgrade+0x900/0x900 [ 266.188739] ? proc_fail_nth_write+0x9e/0x210 [ 266.193326] ? __fget_light+0x2e9/0x430 [ 266.197331] ? fget_raw+0x20/0x20 [ 266.200802] ? find_held_lock+0x36/0x1c0 [ 266.204872] ? kasan_check_write+0x14/0x20 [ 266.209141] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 266.214065] ? wait_for_completion+0x8a0/0x8a0 [ 266.218641] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.224166] ? sockfd_lookup_light+0xc5/0x160 [ 266.228648] __sys_sendmsg+0x11d/0x280 [ 266.232522] ? __ia32_sys_shutdown+0x80/0x80 [ 266.236953] ? __sb_end_write+0xd9/0x110 [ 266.241007] ? fput+0x130/0x1a0 [ 266.244301] ? do_syscall_64+0x9a/0x820 [ 266.248265] ? do_syscall_64+0x9a/0x820 [ 266.252245] ? trace_hardirqs_off_caller+0x310/0x310 [ 266.257356] __x64_sys_sendmsg+0x78/0xb0 [ 266.261407] do_syscall_64+0x1b9/0x820 [ 266.265302] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.270657] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.275576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.280404] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.285411] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.290418] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.295421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.300283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.305456] RIP: 0033:0x457569 [ 266.308641] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.327552] RSP: 002b:00007f2f8f5f3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 266.335258] RAX: ffffffffffffffda RBX: 00007f2f8f5f3c90 RCX: 0000000000457569 [ 266.342511] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 266.349763] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 266.357016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f8f5f46d4 [ 266.364270] R13: 00000000004c3fff R14: 00000000004d6698 R15: 0000000000000005 12:24:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x1500, 0x485, 0x0, 0x0) 12:24:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:01 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:01 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:01 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 266.561525] FAULT_INJECTION: forcing a failure. [ 266.561525] name failslab, interval 1, probability 0, space 0, times 0 [ 266.562362] FAULT_INJECTION: forcing a failure. [ 266.562362] name failslab, interval 1, probability 0, space 0, times 0 [ 266.587462] CPU: 1 PID: 9334 Comm: syz-executor5 Not tainted 4.20.0-rc5+ #362 [ 266.594753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.604110] Call Trace: [ 266.604138] dump_stack+0x244/0x39d [ 266.604171] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.604208] should_fail.cold.4+0xa/0x17 [ 266.619665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.624863] ? __save_stack_trace+0x8d/0xf0 [ 266.629218] ? save_stack+0xa9/0xd0 [ 266.632868] ? save_stack+0x43/0xd0 [ 266.636516] ? find_held_lock+0x36/0x1c0 [ 266.640638] ? xen_alloc_pte+0x8a8/0x1c70 [ 266.644806] ? xen_alloc_pte+0x8a8/0x1c70 [ 266.648961] ? perf_trace_sched_process_exec+0x860/0x860 [ 266.654430] ? check_preemption_disabled+0x48/0x280 12:24:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 266.659475] __should_failslab+0x124/0x180 [ 266.663737] should_failslab+0x9/0x14 [ 266.667548] kmem_cache_alloc_node_trace+0x270/0x740 [ 266.672678] __kmalloc_node_track_caller+0x3c/0x70 [ 266.677633] __kmalloc_reserve.isra.40+0x41/0xe0 [ 266.682402] __alloc_skb+0x155/0x770 [ 266.686150] ? netdev_alloc_frag+0x1f0/0x1f0 [ 266.690577] ? __release_sock+0x3a0/0x3a0 [ 266.694751] ? __local_bh_enable_ip+0x160/0x260 [ 266.699458] ? netlink_insert+0xfe/0x240 [ 266.699502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.699525] ? netlink_autobind.isra.34+0x232/0x310 [ 266.699574] netlink_sendmsg+0xb29/0xfc0 [ 266.699612] ? netlink_unicast+0x760/0x760 [ 266.722495] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 266.722516] ? apparmor_socket_sendmsg+0x29/0x30 [ 266.722534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.722552] ? security_socket_sendmsg+0x94/0xc0 [ 266.722567] ? netlink_unicast+0x760/0x760 [ 266.722587] sock_sendmsg+0xd5/0x120 [ 266.750518] ___sys_sendmsg+0x7fd/0x930 [ 266.754507] ? copy_msghdr_from_user+0x580/0x580 12:24:01 executing program 1: r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 266.759282] ? lock_downgrade+0x900/0x900 [ 266.763447] ? proc_fail_nth_write+0x9e/0x210 [ 266.767961] ? __fget_light+0x2e9/0x430 [ 266.771947] ? fget_raw+0x20/0x20 [ 266.775408] ? find_held_lock+0x36/0x1c0 [ 266.779487] ? kasan_check_write+0x14/0x20 [ 266.783740] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 266.788723] ? wait_for_completion+0x8a0/0x8a0 [ 266.793330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.798897] ? sockfd_lookup_light+0xc5/0x160 [ 266.803409] __sys_sendmsg+0x11d/0x280 [ 266.807328] ? __ia32_sys_shutdown+0x80/0x80 [ 266.811777] ? __sb_end_write+0xd9/0x110 [ 266.815855] ? fput+0x130/0x1a0 [ 266.819162] ? do_syscall_64+0x9a/0x820 [ 266.823149] ? do_syscall_64+0x9a/0x820 [ 266.827149] ? trace_hardirqs_off_caller+0x310/0x310 [ 266.832321] __x64_sys_sendmsg+0x78/0xb0 [ 266.836397] do_syscall_64+0x1b9/0x820 [ 266.840296] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.845674] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.850620] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.855479] ? trace_hardirqs_on_caller+0x310/0x310 12:24:01 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 266.860505] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.865542] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.870582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.875440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.880634] RIP: 0033:0x457569 [ 266.883847] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.902773] RSP: 002b:00007f2f8f5f3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 266.910489] RAX: ffffffffffffffda RBX: 00007f2f8f5f3c90 RCX: 0000000000457569 [ 266.917785] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 266.925062] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 266.932332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f8f5f46d4 [ 266.939608] R13: 00000000004c3fff R14: 00000000004d6698 R15: 0000000000000005 [ 266.950736] CPU: 0 PID: 9341 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 266.953484] cgroup: fork rejected by pids controller in /syz1 [ 266.958517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.958523] Call Trace: [ 266.958543] dump_stack+0x244/0x39d [ 266.958565] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.958581] ? lock_downgrade+0x900/0x900 [ 266.958599] ? check_preemption_disabled+0x48/0x280 [ 266.958625] should_fail.cold.4+0xa/0x17 [ 266.958638] ? rcu_softirq_qs+0x20/0x20 [ 266.958656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.958682] ? __fget+0x4d1/0x740 [ 266.958706] ? ksys_dup3+0x680/0x680 [ 267.014752] ? find_held_lock+0x36/0x1c0 [ 267.018842] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.024307] __should_failslab+0x124/0x180 [ 267.028552] should_failslab+0x9/0x14 [ 267.032355] kmem_cache_alloc_trace+0x2d7/0x750 [ 267.037080] ? bpf_get_file_flag+0x80/0x80 [ 267.041323] ? __f_unlock_pos+0x19/0x20 [ 267.045333] bpf_map_meta_alloc+0x182/0x420 [ 267.049663] htab_of_map_alloc+0x48/0x100 [ 267.053814] ? htab_map_alloc+0x1190/0x1190 [ 267.058155] map_create+0x3bd/0x1110 [ 267.061875] ? find_held_lock+0x36/0x1c0 [ 267.065940] ? bpf_map_new_fd+0x70/0x70 [ 267.069925] ? __might_fault+0x12b/0x1e0 [ 267.073988] ? lock_downgrade+0x900/0x900 [ 267.078169] ? lock_release+0xa00/0xa00 [ 267.082145] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.087645] ? usercopy_warn+0x110/0x110 [ 267.091741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.097291] __x64_sys_bpf+0x303/0x520 [ 267.101197] ? bpf_prog_get+0x20/0x20 [ 267.105019] do_syscall_64+0x1b9/0x820 [ 267.108906] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.114288] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.119230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.124106] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.129143] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.134165] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.139189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.144044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.149231] RIP: 0033:0x457569 [ 267.152429] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.171328] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 267.179039] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 267.186309] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 267.193577] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 267.200845] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x7ffffffff000, 0x485, 0x0, 0x0) [ 267.208128] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x44, 0x485, 0x0, 0x0) 12:24:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x83, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:02 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100000000030000000000000000000000001200000300000000000000000000"], 0x53) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x20000284, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x15000000000000, 0x485, 0x0, 0x0) [ 267.482682] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 267.585595] FAULT_INJECTION: forcing a failure. [ 267.585595] name failslab, interval 1, probability 0, space 0, times 0 [ 267.601964] CPU: 1 PID: 9411 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 267.609259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.618620] Call Trace: [ 267.621280] dump_stack+0x244/0x39d [ 267.624931] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.630147] should_fail.cold.4+0xa/0x17 [ 267.634235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.639355] ? __save_stack_trace+0x8d/0xf0 [ 267.643706] ? save_stack+0xa9/0xd0 [ 267.647361] ? find_held_lock+0x36/0x1c0 [ 267.651469] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.656930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.662493] __should_failslab+0x124/0x180 [ 267.666754] should_failslab+0x9/0x14 [ 267.670561] kmem_cache_alloc_trace+0x2d7/0x750 [ 267.675242] htab_map_alloc+0xe1/0x1190 [ 267.679245] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.684767] ? fput+0x130/0x1a0 [ 267.688034] ? bpf_map_meta_alloc+0x109/0x420 [ 267.692518] htab_of_map_alloc+0x7d/0x100 [ 267.696653] ? htab_map_alloc+0x1190/0x1190 [ 267.700961] map_create+0x3bd/0x1110 [ 267.704662] ? find_held_lock+0x36/0x1c0 [ 267.708722] ? bpf_map_new_fd+0x70/0x70 [ 267.712688] ? __might_fault+0x12b/0x1e0 [ 267.716745] ? lock_downgrade+0x900/0x900 [ 267.720881] ? lock_release+0xa00/0xa00 [ 267.724840] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.730280] ? usercopy_warn+0x110/0x110 [ 267.734355] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.739884] __x64_sys_bpf+0x303/0x520 [ 267.743768] ? bpf_prog_get+0x20/0x20 [ 267.747563] do_syscall_64+0x1b9/0x820 [ 267.751443] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.756822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.761743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.766587] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.771607] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.776609] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.781612] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.786442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.791617] RIP: 0033:0x457569 [ 267.794856] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.813741] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 267.821444] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 267.828722] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 12:24:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x150000, 0x485, 0x0, 0x0) 12:24:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b04, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 267.835988] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 267.843256] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 267.850535] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:02 executing program 4 (fault-call:2 fault-nth:2): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 267.942477] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 268.045146] FAULT_INJECTION: forcing a failure. [ 268.045146] name failslab, interval 1, probability 0, space 0, times 0 [ 268.071529] CPU: 0 PID: 9436 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 268.078820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.078828] Call Trace: [ 268.078855] dump_stack+0x244/0x39d [ 268.078881] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.078973] ? is_bpf_text_address+0xac/0x170 [ 268.079005] should_fail.cold.4+0xa/0x17 [ 268.091385] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 268.091407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.091420] ? rcu_softirq_qs+0x20/0x20 [ 268.091435] ? rcu_softirq_qs+0x20/0x20 [ 268.091485] ? unwind_dump+0x190/0x190 [ 268.091556] ? kernel_text_address+0x79/0xf0 [ 268.100319] ? __kernel_text_address+0xd/0x40 [ 268.100342] ? find_held_lock+0x36/0x1c0 [ 268.100380] ? htab_map_alloc+0xe1/0x1190 [ 268.100412] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.100444] ? do_syscall_64+0x1b9/0x820 [ 268.100470] __should_failslab+0x124/0x180 [ 268.109017] should_failslab+0x9/0x14 [ 268.109035] kmem_cache_alloc_node_trace+0x270/0x740 [ 268.109054] ? refcount_add_not_zero_checked+0x270/0x330 [ 268.109070] ? find_user+0x130/0x130 [ 268.109123] __get_vm_area_node+0x130/0x3a0 [ 268.109145] __vmalloc_node_range+0xc4/0x750 [ 268.119171] ? htab_map_alloc+0x29e/0x1190 [ 268.119187] ? bpf_map_precharge_memlock+0x216/0x2f0 [ 268.119205] ? bpf_map_init_from_attr+0x2e0/0x2e0 [ 268.119225] ? htab_map_alloc+0x29e/0x1190 [ 268.119244] __vmalloc_node_flags_caller+0x75/0x90 [ 268.119260] ? htab_map_alloc+0x29e/0x1190 [ 268.119277] bpf_map_area_alloc+0x6f/0x90 [ 268.127209] htab_map_alloc+0x29e/0x1190 [ 268.127243] htab_of_map_alloc+0x7d/0x100 [ 268.127259] ? htab_map_alloc+0x1190/0x1190 [ 268.127272] map_create+0x3bd/0x1110 [ 268.127289] ? find_held_lock+0x36/0x1c0 [ 268.127306] ? bpf_map_new_fd+0x70/0x70 [ 268.135590] ? __might_fault+0x12b/0x1e0 [ 268.135608] ? lock_downgrade+0x900/0x900 [ 268.135628] ? lock_release+0xa00/0xa00 [ 268.135641] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.135660] ? usercopy_warn+0x110/0x110 [ 268.135691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.144215] __x64_sys_bpf+0x303/0x520 [ 268.144230] ? bpf_prog_get+0x20/0x20 [ 268.144265] do_syscall_64+0x1b9/0x820 [ 268.144280] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.144300] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.153869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.153889] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.153906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.153924] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.153945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.162220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.162233] RIP: 0033:0x457569 12:24:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x10, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x16, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 268.162249] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.162258] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 268.162273] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 268.162289] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 268.171165] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.171175] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 268.171185] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:03 executing program 4 (fault-call:2 fault-nth:3): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x6000000, 0x485, 0x0, 0x0) 12:24:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xef0a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:03 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 268.520124] FAULT_INJECTION: forcing a failure. [ 268.520124] name failslab, interval 1, probability 0, space 0, times 0 12:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x17, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 268.580539] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 268.608069] CPU: 1 PID: 9463 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 268.615407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.624761] Call Trace: [ 268.627366] dump_stack+0x244/0x39d [ 268.631025] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.636239] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 268.636270] should_fail.cold.4+0xa/0x17 [ 268.636288] ? unwind_dump+0x190/0x190 [ 268.636322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.645301] ? is_bpf_text_address+0xd3/0x170 [ 268.645324] ? __kernel_text_address+0xd/0x40 [ 268.645340] ? unwind_get_return_address+0x61/0xa0 [ 268.645359] ? __save_stack_trace+0x8d/0xf0 [ 268.645384] ? find_held_lock+0x36/0x1c0 [ 268.645418] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.654387] __should_failslab+0x124/0x180 [ 268.654409] should_failslab+0x9/0x14 [ 268.654427] kmem_cache_alloc_node_trace+0x270/0x740 [ 268.654456] alloc_vmap_area+0x145/0xa50 [ 268.654492] ? __get_vm_area_node+0x130/0x3a0 [ 268.676783] ? purge_vmap_area_lazy+0x40/0x40 [ 268.676803] ? refcount_add_not_zero_checked+0x270/0x330 [ 268.676821] ? find_user+0x130/0x130 [ 268.676851] __get_vm_area_node+0x181/0x3a0 [ 268.703967] __vmalloc_node_range+0xc4/0x750 [ 268.703985] ? htab_map_alloc+0x29e/0x1190 12:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 268.704001] ? bpf_map_precharge_memlock+0x216/0x2f0 [ 268.704019] ? bpf_map_init_from_attr+0x2e0/0x2e0 [ 268.704040] ? htab_map_alloc+0x29e/0x1190 [ 268.704059] __vmalloc_node_flags_caller+0x75/0x90 [ 268.704078] ? htab_map_alloc+0x29e/0x1190 [ 268.735744] bpf_map_area_alloc+0x6f/0x90 [ 268.735764] htab_map_alloc+0x29e/0x1190 [ 268.735800] htab_of_map_alloc+0x7d/0x100 [ 268.735816] ? htab_map_alloc+0x1190/0x1190 [ 268.735830] map_create+0x3bd/0x1110 [ 268.735854] ? find_held_lock+0x36/0x1c0 12:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7a, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 268.766425] ? bpf_map_new_fd+0x70/0x70 [ 268.766447] ? __might_fault+0x12b/0x1e0 [ 268.766466] ? lock_downgrade+0x900/0x900 [ 268.766487] ? lock_release+0xa00/0xa00 [ 268.766502] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.766522] ? usercopy_warn+0x110/0x110 [ 268.766555] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.790798] __x64_sys_bpf+0x303/0x520 [ 268.790815] ? bpf_prog_get+0x20/0x20 [ 268.790853] do_syscall_64+0x1b9/0x820 [ 268.790869] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.790888] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.790904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.790925] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.800332] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.800352] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.800376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.800400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.800413] RIP: 0033:0x457569 [ 268.800431] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.810007] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 268.810023] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 268.810033] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 268.810047] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.826968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 268.826977] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000"], 0x2a) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:04 executing program 4 (fault-call:2 fault-nth:4): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc50a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x6, 0x485, 0x0, 0x0) 12:24:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x71, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 269.292381] FAULT_INJECTION: forcing a failure. [ 269.292381] name failslab, interval 1, probability 0, space 0, times 0 [ 269.318558] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001000000000000010000000003000000000000"], 0x3f) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 269.349311] CPU: 1 PID: 9514 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 269.356678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.366056] Call Trace: [ 269.368670] dump_stack+0x244/0x39d [ 269.372321] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.377531] ? __vmalloc_node_flags_caller+0x75/0x90 [ 269.382647] ? bpf_map_area_alloc+0x6f/0x90 [ 269.386985] ? htab_map_alloc+0x29e/0x1190 [ 269.391239] ? htab_of_map_alloc+0x7d/0x100 [ 269.395575] ? __x64_sys_bpf+0x303/0x520 [ 269.399651] should_fail.cold.4+0xa/0x17 [ 269.403747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.408872] ? find_held_lock+0x36/0x1c0 [ 269.413215] ? zap_class+0x640/0x640 [ 269.416948] ? alloc_vmap_area+0x6b9/0xa50 [ 269.421197] ? find_held_lock+0x36/0x1c0 [ 269.425302] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.430776] __should_failslab+0x124/0x180 [ 269.435027] should_failslab+0x9/0x14 [ 269.438843] kmem_cache_alloc_node_trace+0x270/0x740 [ 269.443973] __kmalloc_node+0x3c/0x70 12:24:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 269.447795] __vmalloc_node_range+0x1ed/0x750 [ 269.452308] ? bpf_map_init_from_attr+0x2e0/0x2e0 [ 269.457170] ? htab_map_alloc+0x29e/0x1190 [ 269.461446] __vmalloc_node_flags_caller+0x75/0x90 [ 269.466389] ? htab_map_alloc+0x29e/0x1190 [ 269.470643] bpf_map_area_alloc+0x6f/0x90 [ 269.474813] htab_map_alloc+0x29e/0x1190 [ 269.478910] htab_of_map_alloc+0x7d/0x100 [ 269.483071] ? htab_map_alloc+0x1190/0x1190 [ 269.483086] map_create+0x3bd/0x1110 [ 269.483105] ? find_held_lock+0x36/0x1c0 [ 269.483124] ? bpf_map_new_fd+0x70/0x70 [ 269.499238] ? __might_fault+0x12b/0x1e0 [ 269.503313] ? lock_downgrade+0x900/0x900 [ 269.507473] ? lock_release+0xa00/0xa00 [ 269.511486] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.516957] ? usercopy_warn+0x110/0x110 [ 269.521051] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.526638] __x64_sys_bpf+0x303/0x520 [ 269.530542] ? bpf_prog_get+0x20/0x20 [ 269.534367] do_syscall_64+0x1b9/0x820 [ 269.538264] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.543646] ? syscall_return_slowpath+0x5e0/0x5e0 12:24:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x1c, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 269.548594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.553459] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.558493] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.563531] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.568585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.573445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.578648] RIP: 0033:0x457569 [ 269.581846] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:24:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x100000000000000, 0x485, 0x0, 0x0) [ 269.600761] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 269.608500] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 269.615778] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 269.623053] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 269.630345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 269.637619] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x44000000, 0x485, 0x0, 0x0) 12:24:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x200b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:04 executing program 4 (fault-call:2 fault-nth:5): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 270.187011] FAULT_INJECTION: forcing a failure. [ 270.187011] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 270.201572] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 270.223233] CPU: 0 PID: 9569 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 270.230560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.239934] Call Trace: [ 270.242537] dump_stack+0x244/0x39d [ 270.246203] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.251428] ? find_held_lock+0x36/0x1c0 [ 270.251459] should_fail.cold.4+0xa/0x17 [ 270.251485] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.259585] ? zap_class+0x640/0x640 [ 270.259601] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 270.259618] ? kasan_check_read+0x11/0x20 [ 270.259634] ? rcu_softirq_qs+0x20/0x20 [ 270.259652] ? unwind_dump+0x190/0x190 [ 270.259673] ? find_held_lock+0x36/0x1c0 [ 270.289485] ? lock_release+0xa00/0xa00 [ 270.293477] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.298969] ? __might_sleep+0x95/0x190 [ 270.303075] __alloc_pages_nodemask+0x366/0xea0 [ 270.307771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.313165] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 270.318201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.323762] ? check_preemption_disabled+0x48/0x280 [ 270.328868] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 12:24:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x15, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x4400, 0x485, 0x0, 0x0) 12:24:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x14, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 270.334429] ? __kmalloc_node+0x3c/0x70 [ 270.338420] ? __kmalloc_node+0x3c/0x70 [ 270.342436] ? rcu_read_lock_sched_held+0x14f/0x180 [ 270.347467] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 270.352772] ? kasan_unpoison_shadow+0x35/0x50 [ 270.357375] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.362938] alloc_pages_current+0x173/0x350 [ 270.367386] __vmalloc_node_range+0x498/0x750 [ 270.371910] ? bpf_map_init_from_attr+0x2e0/0x2e0 [ 270.376772] ? htab_map_alloc+0x29e/0x1190 [ 270.381022] __vmalloc_node_flags_caller+0x75/0x90 [ 270.385970] ? htab_map_alloc+0x29e/0x1190 [ 270.390218] bpf_map_area_alloc+0x6f/0x90 [ 270.394392] htab_map_alloc+0x29e/0x1190 [ 270.398513] htab_of_map_alloc+0x7d/0x100 [ 270.402689] ? htab_map_alloc+0x1190/0x1190 [ 270.407036] map_create+0x3bd/0x1110 [ 270.410786] ? find_held_lock+0x36/0x1c0 [ 270.414856] ? bpf_map_new_fd+0x70/0x70 [ 270.418841] ? __might_fault+0x12b/0x1e0 [ 270.422921] ? lock_downgrade+0x900/0x900 [ 270.427086] ? lock_release+0xa00/0xa00 [ 270.431073] ? perf_trace_sched_process_exec+0x860/0x860 12:24:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x74, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 270.436538] ? usercopy_warn+0x110/0x110 [ 270.440642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.446209] __x64_sys_bpf+0x303/0x520 [ 270.450136] ? bpf_prog_get+0x20/0x20 [ 270.454011] do_syscall_64+0x1b9/0x820 [ 270.457926] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.463300] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.463318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.463338] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.463356] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.463375] ? prepare_exit_to_usermode+0x291/0x3b0 [ 270.463400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.473184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.473198] RIP: 0033:0x457569 [ 270.473215] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.473223] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.473239] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 12:24:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000010000000000000100"], 0x35) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 270.473249] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 270.473258] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 270.473268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 270.473282] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:05 executing program 4 (fault-call:2 fault-nth:6): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x24, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x170b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x600000000000000, 0x485, 0x0, 0x0) [ 270.779805] FAULT_INJECTION: forcing a failure. [ 270.779805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.786104] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 270.801488] CPU: 0 PID: 9619 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 270.808784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.818139] Call Trace: [ 270.820759] dump_stack+0x244/0x39d [ 270.824422] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.829639] ? find_held_lock+0x36/0x1c0 [ 270.829665] should_fail.cold.4+0xa/0x17 [ 270.829687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.829705] ? zap_class+0x640/0x640 [ 270.829753] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 270.851554] ? kasan_check_read+0x11/0x20 [ 270.855704] ? rcu_softirq_qs+0x20/0x20 [ 270.859697] ? unwind_dump+0x190/0x190 [ 270.863638] ? find_held_lock+0x36/0x1c0 [ 270.867727] ? check_preemption_disabled+0x48/0x280 [ 270.872769] ? lock_release+0xa00/0xa00 [ 270.876764] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.882225] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 270.887770] ? rcu_pm_notify+0xc0/0xc0 [ 270.891662] ? __might_sleep+0x95/0x190 [ 270.895658] __alloc_pages_nodemask+0x366/0xea0 [ 270.900325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.905696] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 270.910779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.916346] ? check_preemption_disabled+0x48/0x280 [ 270.921375] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 270.926966] ? kasan_unpoison_shadow+0x35/0x50 [ 270.931549] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.937107] alloc_pages_current+0x173/0x350 [ 270.941526] __vmalloc_node_range+0x498/0x750 [ 270.946031] ? htab_map_alloc+0x29e/0x1190 [ 270.950272] __vmalloc_node_flags_caller+0x75/0x90 [ 270.955200] ? htab_map_alloc+0x29e/0x1190 [ 270.959905] bpf_map_area_alloc+0x6f/0x90 [ 270.964057] htab_map_alloc+0x29e/0x1190 [ 270.968139] htab_of_map_alloc+0x7d/0x100 [ 270.972290] ? htab_map_alloc+0x1190/0x1190 [ 270.976625] map_create+0x3bd/0x1110 [ 270.980355] ? find_held_lock+0x36/0x1c0 [ 270.984420] ? bpf_map_new_fd+0x70/0x70 [ 270.988399] ? __might_fault+0x12b/0x1e0 [ 270.992467] ? lock_downgrade+0x900/0x900 [ 270.996616] ? lock_release+0xa00/0xa00 [ 271.000589] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.006049] ? usercopy_warn+0x110/0x110 [ 271.010129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.015686] __x64_sys_bpf+0x303/0x520 [ 271.019596] ? bpf_prog_get+0x20/0x20 [ 271.023432] do_syscall_64+0x1b9/0x820 [ 271.027336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.032702] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.037660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.042511] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.047530] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.052551] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.057578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.063306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.068522] RIP: 0033:0x457569 [ 271.071744] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.090650] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.098377] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 271.105643] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 271.112939] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 271.120204] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001000000"], 0x30) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 271.127479] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x4400000000000000, 0x485, 0x0, 0x0) 12:24:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x22, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020"], 0x2b) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10ac9, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0xf0ffffff7f0000, 0x485, 0x0, 0x0) 12:24:06 executing program 4 (fault-call:2 fault-nth:7): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:06 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x12, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100"], 0x2e) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 271.608334] FAULT_INJECTION: forcing a failure. [ 271.608334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 271.628916] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 271.638473] CPU: 1 PID: 9667 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 271.645768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.655128] Call Trace: [ 271.657773] dump_stack+0x244/0x39d [ 271.661428] ? dump_stack_print_info.cold.1+0x20/0x20 [ 271.666659] ? find_held_lock+0x36/0x1c0 [ 271.670753] should_fail.cold.4+0xa/0x17 [ 271.674849] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.679970] ? zap_class+0x640/0x640 [ 271.683701] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 271.688656] ? kasan_check_read+0x11/0x20 [ 271.692817] ? rcu_softirq_qs+0x20/0x20 [ 271.696835] ? unwind_dump+0x190/0x190 [ 271.700771] ? find_held_lock+0x36/0x1c0 [ 271.704863] ? check_preemption_disabled+0x48/0x280 [ 271.709897] ? lock_release+0xa00/0xa00 [ 271.713883] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.719368] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 271.724923] ? rcu_pm_notify+0xc0/0xc0 [ 271.728828] ? __might_sleep+0x95/0x190 [ 271.732836] __alloc_pages_nodemask+0x366/0xea0 [ 271.737523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.742909] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 271.747937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.753489] ? check_preemption_disabled+0x48/0x280 [ 271.758538] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 271.764108] ? kasan_unpoison_shadow+0x35/0x50 [ 271.768706] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 271.774293] alloc_pages_current+0x173/0x350 [ 271.778734] __vmalloc_node_range+0x498/0x750 [ 271.783280] ? htab_map_alloc+0x29e/0x1190 [ 271.787533] __vmalloc_node_flags_caller+0x75/0x90 [ 271.792470] ? htab_map_alloc+0x29e/0x1190 [ 271.796733] bpf_map_area_alloc+0x6f/0x90 [ 271.800897] htab_map_alloc+0x29e/0x1190 [ 271.805003] htab_of_map_alloc+0x7d/0x100 12:24:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x1000000, 0x485, 0x0, 0x0) 12:24:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100"], 0x2e) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 271.809166] ? htab_map_alloc+0x1190/0x1190 [ 271.813503] map_create+0x3bd/0x1110 [ 271.817248] ? find_held_lock+0x36/0x1c0 [ 271.821334] ? bpf_map_new_fd+0x70/0x70 [ 271.825317] ? __might_fault+0x12b/0x1e0 [ 271.829399] ? lock_downgrade+0x900/0x900 [ 271.829419] ? lock_release+0xa00/0xa00 [ 271.829433] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.829453] ? usercopy_warn+0x110/0x110 [ 271.829484] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.852629] __x64_sys_bpf+0x303/0x520 12:24:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xd, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 271.856566] ? bpf_prog_get+0x20/0x20 [ 271.856618] do_syscall_64+0x1b9/0x820 [ 271.856636] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.869690] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.874633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.874654] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.874672] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.874692] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.894608] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.899481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.899495] RIP: 0033:0x457569 [ 271.899512] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.899521] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.899537] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 271.899546] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 271.899555] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 271.899564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 271.899579] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xa, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x2c0b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x600, 0x485, 0x0, 0x0) [ 272.201372] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:07 executing program 4 (fault-call:2 fault-nth:8): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x73, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x15, 0x485, 0x0, 0x0) 12:24:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffff7f00000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x21, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 272.402529] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 272.607041] FAULT_INJECTION: forcing a failure. [ 272.607041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.620201] CPU: 0 PID: 9744 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 272.627489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.636848] Call Trace: [ 272.639446] dump_stack+0x244/0x39d [ 272.643064] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.648242] ? find_held_lock+0x36/0x1c0 [ 272.652294] should_fail.cold.4+0xa/0x17 [ 272.656338] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.661442] ? zap_class+0x640/0x640 [ 272.665154] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 272.670076] ? kasan_check_read+0x11/0x20 [ 272.674238] ? rcu_softirq_qs+0x20/0x20 [ 272.678253] ? unwind_dump+0x190/0x190 [ 272.682144] ? find_held_lock+0x36/0x1c0 [ 272.686196] ? check_preemption_disabled+0x48/0x280 [ 272.691197] ? lock_release+0xa00/0xa00 [ 272.695155] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.700618] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 272.706152] ? rcu_pm_notify+0xc0/0xc0 [ 272.710026] ? __might_sleep+0x95/0x190 [ 272.713987] __alloc_pages_nodemask+0x366/0xea0 [ 272.718639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.723989] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 272.728990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.734510] ? check_preemption_disabled+0x48/0x280 [ 272.739545] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 272.745077] ? kasan_unpoison_shadow+0x35/0x50 [ 272.749644] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 272.755167] alloc_pages_current+0x173/0x350 [ 272.759560] __vmalloc_node_range+0x498/0x750 [ 272.764060] ? htab_map_alloc+0x29e/0x1190 [ 272.768278] __vmalloc_node_flags_caller+0x75/0x90 [ 272.773189] ? htab_map_alloc+0x29e/0x1190 [ 272.777404] bpf_map_area_alloc+0x6f/0x90 [ 272.781550] htab_map_alloc+0x29e/0x1190 [ 272.785630] htab_of_map_alloc+0x7d/0x100 [ 272.789777] ? htab_map_alloc+0x1190/0x1190 [ 272.794077] map_create+0x3bd/0x1110 [ 272.797806] ? find_held_lock+0x36/0x1c0 [ 272.801855] ? bpf_map_new_fd+0x70/0x70 [ 272.805812] ? __might_fault+0x12b/0x1e0 [ 272.809855] ? lock_downgrade+0x900/0x900 [ 272.813983] ? lock_release+0xa00/0xa00 [ 272.817956] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.823392] ? usercopy_warn+0x110/0x110 [ 272.827440] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.832977] __x64_sys_bpf+0x303/0x520 [ 272.836846] ? bpf_prog_get+0x20/0x20 [ 272.840638] do_syscall_64+0x1b9/0x820 [ 272.844506] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.849851] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.854780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.859617] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.864614] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.869631] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.874631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.879457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.884622] RIP: 0033:0x457569 [ 272.887809] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.906689] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 272.914381] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 272.921632] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 272.928884] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 272.936150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 272.943399] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x19, 0x0, 0x0) 12:24:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xd20a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x11, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:08 executing program 4 (fault-call:2 fault-nth:9): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000100"], 0x2e) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 273.311140] FAULT_INJECTION: forcing a failure. [ 273.311140] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.348322] CPU: 0 PID: 9754 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 273.355645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.365060] Call Trace: [ 273.367661] dump_stack+0x244/0x39d [ 273.371303] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.376505] ? find_held_lock+0x36/0x1c0 [ 273.380579] should_fail.cold.4+0xa/0x17 [ 273.384659] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.389763] ? zap_class+0x640/0x640 [ 273.393475] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 273.398410] ? kasan_check_read+0x11/0x20 [ 273.402558] ? rcu_softirq_qs+0x20/0x20 [ 273.406529] ? unwind_dump+0x190/0x190 [ 273.410424] ? find_held_lock+0x36/0x1c0 [ 273.414537] ? check_preemption_disabled+0x48/0x280 [ 273.419574] ? lock_release+0xa00/0xa00 [ 273.423548] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.429010] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.434552] ? rcu_pm_notify+0xc0/0xc0 [ 273.438445] ? __might_sleep+0x95/0x190 [ 273.442440] __alloc_pages_nodemask+0x366/0xea0 [ 273.447108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.452483] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 273.457502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.463059] ? check_preemption_disabled+0x48/0x280 [ 273.468103] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.473665] ? kasan_unpoison_shadow+0x35/0x50 [ 273.478262] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 273.483834] alloc_pages_current+0x173/0x350 [ 273.488249] __vmalloc_node_range+0x498/0x750 [ 273.492767] ? htab_map_alloc+0x29e/0x1190 [ 273.497002] __vmalloc_node_flags_caller+0x75/0x90 [ 273.501931] ? htab_map_alloc+0x29e/0x1190 [ 273.506169] bpf_map_area_alloc+0x6f/0x90 [ 273.510321] htab_map_alloc+0x29e/0x1190 [ 273.514397] htab_of_map_alloc+0x7d/0x100 [ 273.518542] ? htab_map_alloc+0x1190/0x1190 [ 273.522860] map_create+0x3bd/0x1110 [ 273.526577] ? find_held_lock+0x36/0x1c0 [ 273.530639] ? bpf_map_new_fd+0x70/0x70 [ 273.534621] ? __might_fault+0x12b/0x1e0 [ 273.538730] ? lock_downgrade+0x900/0x900 [ 273.542899] ? lock_release+0xa00/0xa00 [ 273.546869] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.552322] ? usercopy_warn+0x110/0x110 [ 273.556402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.561941] __x64_sys_bpf+0x303/0x520 [ 273.565829] ? bpf_prog_get+0x20/0x20 [ 273.569653] do_syscall_64+0x1b9/0x820 [ 273.573536] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.578904] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.583833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.588683] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.593753] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.598803] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.603828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.608694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.613891] RIP: 0033:0x457569 [ 273.617087] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.635985] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.643732] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 273.651002] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 12:24:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xc, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 273.658273] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 273.665545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 273.672820] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 273.810473] IPVS: ftp: loaded support on port[0] = 21 12:24:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x3, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x66, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 274.213798] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 274.228834] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 275.611976] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.618477] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.625361] device bridge_slave_0 entered promiscuous mode [ 275.648224] device bridge_slave_1 left promiscuous mode [ 275.654341] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.710950] device bridge_slave_0 left promiscuous mode [ 275.716368] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.776078] team0 (unregistering): Port device team_slave_1 removed [ 277.786103] team0 (unregistering): Port device team_slave_0 removed [ 277.797760] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 277.841403] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 277.897089] bond0 (unregistering): Released all slaves [ 277.962172] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.968686] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.975580] device bridge_slave_1 entered promiscuous mode [ 278.005495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 278.032957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 278.145610] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 278.192193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 278.410087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 278.417865] team0: Port device team_slave_0 added [ 278.460940] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 278.468798] team0: Port device team_slave_1 added [ 278.511407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.559673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.605154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 278.612359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.628578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.668972] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 278.676078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.692178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.144381] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.150817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.157513] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.163878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.171409] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 280.057405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.249077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 280.338146] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 280.424846] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 280.431189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.438647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.524087] 8021q: adding VLAN 0 to HW filter on device team0 12:24:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000"], 0x2c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x19, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:15 executing program 4 (fault-call:2 fault-nth:10): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x13, 0x0, 0x0) 12:24:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x4800000000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 281.096758] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 281.100245] FAULT_INJECTION: forcing a failure. [ 281.100245] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.126983] CPU: 1 PID: 10066 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 281.134367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.143745] Call Trace: [ 281.146352] dump_stack+0x244/0x39d [ 281.150000] ? dump_stack_print_info.cold.1+0x20/0x20 [ 281.155249] ? find_held_lock+0x36/0x1c0 [ 281.155278] should_fail.cold.4+0xa/0x17 [ 281.163386] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.163404] ? zap_class+0x640/0x640 [ 281.163422] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 281.172239] ? kasan_check_read+0x11/0x20 [ 281.172258] ? rcu_softirq_qs+0x20/0x20 [ 281.172281] ? unwind_dump+0x190/0x190 [ 281.181339] ? find_held_lock+0x36/0x1c0 [ 281.181436] ? nf_tables_newset+0xe00/0x2c60 [ 281.181462] ? check_preemption_disabled+0x48/0x280 [ 281.189297] ? lock_release+0xa00/0xa00 [ 281.189314] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.189333] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 281.189351] ? rcu_pm_notify+0xc0/0xc0 [ 281.189372] ? __might_sleep+0x95/0x190 [ 281.189397] __alloc_pages_nodemask+0x366/0xea0 [ 281.197861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.197884] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 281.197903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:24:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x24, 0x0, 0x0) [ 281.197921] ? check_preemption_disabled+0x48/0x280 [ 281.197946] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 281.206942] ? kasan_unpoison_shadow+0x35/0x50 [ 281.206962] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 281.230472] alloc_pages_current+0x173/0x350 [ 281.256901] __vmalloc_node_range+0x498/0x750 [ 281.256930] ? htab_map_alloc+0x29e/0x1190 [ 281.256953] __vmalloc_node_flags_caller+0x75/0x90 [ 281.267050] ? htab_map_alloc+0x29e/0x1190 [ 281.267068] bpf_map_area_alloc+0x6f/0x90 [ 281.267086] htab_map_alloc+0x29e/0x1190 [ 281.267118] htab_of_map_alloc+0x7d/0x100 [ 281.275994] ? htab_map_alloc+0x1190/0x1190 [ 281.276009] map_create+0x3bd/0x1110 [ 281.276026] ? find_held_lock+0x36/0x1c0 [ 281.276042] ? bpf_map_new_fd+0x70/0x70 [ 281.276061] ? __might_fault+0x12b/0x1e0 [ 281.285219] ? lock_downgrade+0x900/0x900 [ 281.285247] ? lock_release+0xa00/0xa00 [ 281.285261] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.285282] ? usercopy_warn+0x110/0x110 [ 281.293693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0xb, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 281.293715] __x64_sys_bpf+0x303/0x520 [ 281.293749] ? bpf_prog_get+0x20/0x20 [ 281.301978] do_syscall_64+0x1b9/0x820 [ 281.301994] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.302012] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.302046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.310055] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.310073] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.310091] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.310113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.310136] entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000"], 0x2c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 281.310148] RIP: 0033:0x457569 [ 281.310167] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.322224] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.322246] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 281.322255] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 12:24:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000"], 0x2c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 281.322264] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 281.322273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 281.322287] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x31, 0x0, 0x0) 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000300000000000000000038000000000000000000000000002000"], 0x2c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:16 executing program 4 (fault-call:2 fault-nth:11): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x60, 0x0, 0x0) 12:24:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x270b0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 281.771449] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 281.812796] FAULT_INJECTION: forcing a failure. [ 281.812796] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.845589] CPU: 1 PID: 10133 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 281.852996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.862348] Call Trace: [ 281.862375] dump_stack+0x244/0x39d [ 281.862401] ? dump_stack_print_info.cold.1+0x20/0x20 [ 281.862425] ? find_held_lock+0x36/0x1c0 [ 281.877865] should_fail.cold.4+0xa/0x17 [ 281.877888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.877906] ? zap_class+0x640/0x640 [ 281.877921] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 281.877938] ? kasan_check_read+0x11/0x20 [ 281.877955] ? rcu_softirq_qs+0x20/0x20 [ 281.887116] ? unwind_dump+0x190/0x190 [ 281.895760] ? find_held_lock+0x36/0x1c0 [ 281.911914] ? uvc_video_decode_bulk+0x910/0x920 [ 281.916690] ? check_preemption_disabled+0x48/0x280 [ 281.916711] ? lock_release+0xa00/0xa00 [ 281.916738] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.916757] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 281.916776] ? rcu_pm_notify+0xc0/0xc0 [ 281.925756] ? __might_sleep+0x95/0x190 [ 281.925780] __alloc_pages_nodemask+0x366/0xea0 [ 281.925801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.936780] ? __alloc_pages_slowpath+0x2de0/0x2de0 12:24:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 281.936799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.936817] ? check_preemption_disabled+0x48/0x280 [ 281.936843] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 281.959755] ? kasan_unpoison_shadow+0x35/0x50 [ 281.959772] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 281.959795] alloc_pages_current+0x173/0x350 [ 281.959817] __vmalloc_node_range+0x498/0x750 [ 281.959845] ? htab_map_alloc+0x29e/0x1190 [ 281.959862] __vmalloc_node_flags_caller+0x75/0x90 [ 281.959878] ? htab_map_alloc+0x29e/0x1190 [ 281.959895] bpf_map_area_alloc+0x6f/0x90 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 281.959913] htab_map_alloc+0x29e/0x1190 [ 281.959943] htab_of_map_alloc+0x7d/0x100 [ 281.990510] ? htab_map_alloc+0x1190/0x1190 [ 281.990525] map_create+0x3bd/0x1110 [ 281.990543] ? find_held_lock+0x36/0x1c0 [ 281.990590] ? bpf_map_new_fd+0x70/0x70 [ 281.990611] ? __might_fault+0x12b/0x1e0 [ 282.004250] ? lock_downgrade+0x900/0x900 [ 282.004272] ? lock_release+0xa00/0xa00 [ 282.004286] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.004322] ? usercopy_warn+0x110/0x110 12:24:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) [ 282.012769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.012792] __x64_sys_bpf+0x303/0x520 [ 282.012807] ? bpf_prog_get+0x20/0x20 [ 282.012841] do_syscall_64+0x1b9/0x820 [ 282.021028] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.033094] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.041130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.041151] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.041169] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.041186] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.041207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.064383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.064397] RIP: 0033:0x457569 [ 282.064413] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.064422] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 282.064437] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 282.064451] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 12:24:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x42, 0x0, 0x0) [ 282.106853] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 282.138946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 282.138971] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:17 executing program 1 (fault-call:3 fault-nth:0): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 282.254566] FAULT_INJECTION: forcing a failure. [ 282.254566] name failslab, interval 1, probability 0, space 0, times 0 [ 282.272527] CPU: 0 PID: 10159 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #362 [ 282.279922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.279930] Call Trace: [ 282.279951] dump_stack+0x244/0x39d [ 282.279976] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.280008] should_fail.cold.4+0xa/0x17 [ 282.280049] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.280067] ? __f_unlock_pos+0x19/0x20 [ 282.280088] ? lock_downgrade+0x900/0x900 [ 282.280113] ? proc_fail_nth_write+0x9e/0x210 [ 282.280131] ? proc_cwd_link+0x1d0/0x1d0 [ 282.280177] ? find_held_lock+0x36/0x1c0 [ 282.280216] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.292139] ? check_preemption_disabled+0x48/0x280 [ 282.292166] __should_failslab+0x124/0x180 [ 282.292187] should_failslab+0x9/0x14 [ 282.292202] kmem_cache_alloc+0x2be/0x730 [ 282.292221] ? do_syscall_64+0x9a/0x820 [ 282.301020] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 282.301046] getname_flags+0xd0/0x590 [ 282.301069] __x64_sys_execveat+0xd4/0x130 [ 282.301090] do_syscall_64+0x1b9/0x820 [ 282.301104] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.301123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.301154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.301173] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.301205] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.301222] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.301243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.301295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.301325] RIP: 0033:0x457569 [ 282.310466] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.310490] RSP: 002b:00007f2fc4e3dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 282.310504] RAX: ffffffffffffffda RBX: 00007f2fc4e3dc90 RCX: 0000000000457569 12:24:17 executing program 4 (fault-call:2 fault-nth:12): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x4, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 282.310513] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 282.310522] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 282.310531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fc4e3e6d4 [ 282.310540] R13: 00000000004bdc9b R14: 00000000004cd038 R15: 0000000000000004 12:24:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf40a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x3, 0x0, 0x0) 12:24:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xa00) [ 282.583981] FAULT_INJECTION: forcing a failure. [ 282.583981] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 282.627578] CPU: 1 PID: 10177 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 282.634984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.644344] Call Trace: [ 282.646947] dump_stack+0x244/0x39d [ 282.650645] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.655857] ? find_held_lock+0x36/0x1c0 [ 282.659972] should_fail.cold.4+0xa/0x17 [ 282.664062] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.669229] ? zap_class+0x640/0x640 [ 282.672961] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 282.677908] ? kasan_check_read+0x11/0x20 [ 282.682073] ? rcu_softirq_qs+0x20/0x20 [ 282.686059] ? unwind_dump+0x190/0x190 [ 282.689959] ? find_held_lock+0x36/0x1c0 [ 282.694092] ? sctp_can_early_drop+0x10/0x60 [ 282.698522] ? check_preemption_disabled+0x48/0x280 [ 282.703545] ? lock_release+0xa00/0xa00 [ 282.707523] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.712976] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 282.718518] ? rcu_pm_notify+0xc0/0xc0 [ 282.722412] ? __might_sleep+0x95/0x190 [ 282.726399] __alloc_pages_nodemask+0x366/0xea0 [ 282.731075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.736452] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 282.741489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.747030] ? check_preemption_disabled+0x48/0x280 [ 282.752077] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 282.757654] ? dev_fill_metadata_dst+0x4e0/0x840 [ 282.762426] ? kasan_unpoison_shadow+0x35/0x50 [ 282.767023] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 282.772574] alloc_pages_current+0x173/0x350 [ 282.777022] __vmalloc_node_range+0x498/0x750 [ 282.781532] ? htab_map_alloc+0x29e/0x1190 [ 282.785770] __vmalloc_node_flags_caller+0x75/0x90 [ 282.790702] ? htab_map_alloc+0x29e/0x1190 [ 282.794950] bpf_map_area_alloc+0x6f/0x90 [ 282.799109] htab_map_alloc+0x29e/0x1190 [ 282.803209] htab_of_map_alloc+0x7d/0x100 [ 282.807362] ? htab_map_alloc+0x1190/0x1190 [ 282.811682] map_create+0x3bd/0x1110 [ 282.815418] ? find_held_lock+0x36/0x1c0 [ 282.819484] ? bpf_map_new_fd+0x70/0x70 [ 282.823465] ? __might_fault+0x12b/0x1e0 [ 282.827533] ? lock_downgrade+0x900/0x900 [ 282.831688] ? lock_release+0xa00/0xa00 [ 282.835662] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.841120] ? usercopy_warn+0x110/0x110 [ 282.845199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.850750] __x64_sys_bpf+0x303/0x520 [ 282.854641] ? bpf_prog_get+0x20/0x20 [ 282.858475] do_syscall_64+0x1b9/0x820 [ 282.862368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.867744] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.872675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.877542] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.882580] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.887614] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.892647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.897501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.902692] RIP: 0033:0x457569 [ 282.905894] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:24:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x8, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x22, 0x0, 0x0) [ 282.924798] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 282.932508] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 282.939792] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 282.947058] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 282.954325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 282.961743] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 282.995166] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:17 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1100) 12:24:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:18 executing program 4 (fault-call:2 fault-nth:13): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x83, 0x0, 0x0) 12:24:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x1d, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b1c, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xb00) 12:24:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1005) 12:24:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x1e, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 283.305508] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 283.323308] FAULT_INJECTION: forcing a failure. [ 283.323308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.373457] CPU: 0 PID: 10236 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 283.380838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.390202] Call Trace: [ 283.392822] dump_stack+0x244/0x39d [ 283.396471] ? dump_stack_print_info.cold.1+0x20/0x20 [ 283.401688] ? find_held_lock+0x36/0x1c0 [ 283.405784] should_fail.cold.4+0xa/0x17 [ 283.409861] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.414983] ? zap_class+0x640/0x640 [ 283.418710] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 283.423663] ? kasan_check_read+0x11/0x20 [ 283.427819] ? rcu_softirq_qs+0x20/0x20 [ 283.427837] ? unwind_dump+0x190/0x190 [ 283.427859] ? find_held_lock+0x36/0x1c0 [ 283.427889] ? check_preemption_disabled+0x48/0x280 [ 283.444800] ? lock_release+0xa00/0xa00 [ 283.448798] ? perf_trace_sched_process_exec+0x860/0x860 [ 283.454256] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 283.459805] ? rcu_pm_notify+0xc0/0xc0 [ 283.463705] ? __might_sleep+0x95/0x190 [ 283.467712] __alloc_pages_nodemask+0x366/0xea0 [ 283.472442] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.477828] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 283.482876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.488429] ? check_preemption_disabled+0x48/0x280 [ 283.493466] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 283.499039] ? kasan_unpoison_shadow+0x35/0x50 [ 283.503634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 283.509203] alloc_pages_current+0x173/0x350 [ 283.513628] __vmalloc_node_range+0x498/0x750 [ 283.518149] ? htab_map_alloc+0x29e/0x1190 [ 283.522402] __vmalloc_node_flags_caller+0x75/0x90 [ 283.527345] ? htab_map_alloc+0x29e/0x1190 [ 283.531595] bpf_map_area_alloc+0x6f/0x90 [ 283.535766] htab_map_alloc+0x29e/0x1190 [ 283.539873] htab_of_map_alloc+0x7d/0x100 [ 283.539890] ? htab_map_alloc+0x1190/0x1190 [ 283.539903] map_create+0x3bd/0x1110 [ 283.539924] ? find_held_lock+0x36/0x1c0 [ 283.548393] ? bpf_map_new_fd+0x70/0x70 [ 283.548412] ? __might_fault+0x12b/0x1e0 [ 283.548429] ? lock_downgrade+0x900/0x900 [ 283.548447] ? lock_release+0xa00/0xa00 [ 283.556197] ? perf_trace_sched_process_exec+0x860/0x860 [ 283.556218] ? usercopy_warn+0x110/0x110 [ 283.556251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.572388] __x64_sys_bpf+0x303/0x520 [ 283.572405] ? bpf_prog_get+0x20/0x20 [ 283.572441] do_syscall_64+0x1b9/0x820 [ 283.572460] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.591352] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.591369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.591387] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.591404] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:24:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x23, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 283.591424] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.604461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.604485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.604498] RIP: 0033:0x457569 [ 283.604513] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.604527] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 283.639334] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 283.639345] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 283.639355] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 283.639380] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 283.639389] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:18 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x106c) 12:24:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:18 executing program 4 (fault-call:2 fault-nth:14): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2f, 0x0, 0x0) 12:24:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc00a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 283.928989] FAULT_INJECTION: forcing a failure. [ 283.928989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.929876] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 283.963972] CPU: 0 PID: 10270 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 283.971350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.980708] Call Trace: [ 283.983327] dump_stack+0x244/0x39d [ 283.986978] ? dump_stack_print_info.cold.1+0x20/0x20 [ 283.992201] ? find_held_lock+0x36/0x1c0 [ 283.996279] should_fail.cold.4+0xa/0x17 [ 284.000349] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.005454] ? zap_class+0x640/0x640 [ 284.009171] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 284.014118] ? kasan_check_read+0x11/0x20 [ 284.018284] ? rcu_softirq_qs+0x20/0x20 [ 284.022259] ? unwind_dump+0x190/0x190 [ 284.026157] ? find_held_lock+0x36/0x1c0 [ 284.030236] ? check_preemption_disabled+0x48/0x280 [ 284.035254] ? lock_release+0xa00/0xa00 [ 284.039237] ? perf_trace_sched_process_exec+0x860/0x860 [ 284.044692] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 284.050248] ? rcu_pm_notify+0xc0/0xc0 [ 284.054144] ? __might_sleep+0x95/0x190 [ 284.058127] __alloc_pages_nodemask+0x366/0xea0 [ 284.062811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.068187] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 284.073212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.078789] ? check_preemption_disabled+0x48/0x280 [ 284.083816] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 284.089506] ? kasan_unpoison_shadow+0x35/0x50 [ 284.094090] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 284.099641] alloc_pages_current+0x173/0x350 [ 284.104062] __vmalloc_node_range+0x498/0x750 [ 284.108570] ? htab_map_alloc+0x29e/0x1190 [ 284.112807] __vmalloc_node_flags_caller+0x75/0x90 [ 284.117751] ? htab_map_alloc+0x29e/0x1190 [ 284.121997] bpf_map_area_alloc+0x6f/0x90 [ 284.126148] htab_map_alloc+0x29e/0x1190 [ 284.130278] htab_of_map_alloc+0x7d/0x100 [ 284.134432] ? htab_map_alloc+0x1190/0x1190 [ 284.138781] map_create+0x3bd/0x1110 [ 284.142499] ? find_held_lock+0x36/0x1c0 [ 284.146563] ? bpf_map_new_fd+0x70/0x70 [ 284.150546] ? __might_fault+0x12b/0x1e0 [ 284.154696] ? lock_downgrade+0x900/0x900 [ 284.158894] ? lock_release+0xa00/0xa00 [ 284.162882] ? perf_trace_sched_process_exec+0x860/0x860 [ 284.168342] ? usercopy_warn+0x110/0x110 [ 284.172447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.177989] __x64_sys_bpf+0x303/0x520 [ 284.181883] ? bpf_prog_get+0x20/0x20 [ 284.185705] do_syscall_64+0x1b9/0x820 [ 284.189605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.194976] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.199912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.204783] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.209807] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.214829] ? prepare_exit_to_usermode+0x291/0x3b0 [ 284.219855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.224712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.229929] RIP: 0033:0x457569 [ 284.233123] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.252021] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 284.259740] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 284.267007] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 12:24:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x1b, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1068) [ 284.274278] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 284.281551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 284.288823] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6c00000000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x83) 12:24:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xe00) 12:24:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2e, 0x0, 0x0) [ 284.477151] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x20000284) 12:24:19 executing program 4 (fault-call:2 fault-nth:15): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1006) 12:24:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0xc, 0x0, 0x0) 12:24:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x310b0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x28, 0x0, 0x0) 12:24:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x8}, 0x1) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @rand_addr=0x3}}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000140)={{0x2, 0x4e24, @empty}, {0x1}, 0x4, {0x2, 0x4e21, @local}, 'bond_slave_1\x00'}) [ 284.805595] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:19 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x2f00) [ 284.878491] FAULT_INJECTION: forcing a failure. [ 284.878491] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.951302] CPU: 0 PID: 10340 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 284.959154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.968514] Call Trace: [ 284.971124] dump_stack+0x244/0x39d [ 284.974792] ? dump_stack_print_info.cold.1+0x20/0x20 [ 284.980008] ? find_held_lock+0x36/0x1c0 [ 284.984098] should_fail.cold.4+0xa/0x17 [ 284.988176] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.993296] ? zap_class+0x640/0x640 12:24:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) wait4(r1, &(0x7f0000000300), 0x6, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) fsetxattr$security_selinux(r0, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:setrans_exec_t:s0\x00', 0x24, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r2, 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r3 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="0adf2c975bae1e62949a78f26e66d595386324023a8b732b30f1564f07e1829d389d147873a0ab08bed4bdfc3e38456e64529870b75d36b4c3d8ab62993044ffdacc1df5b5a0b546e9f78eac35fee9dc600a841cb72cab0ea84a15517c05fd605dbf4935df814ae5ad50bf99cd6057c1c244", 0x72, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, r3, 0x5d) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x6, 0x0, 0x0) [ 284.997026] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 285.001972] ? kasan_check_read+0x11/0x20 [ 285.006133] ? rcu_softirq_qs+0x20/0x20 [ 285.010119] ? unwind_dump+0x190/0x190 [ 285.014020] ? find_held_lock+0x36/0x1c0 [ 285.018141] ? fou_exit_net+0x350/0x400 [ 285.018168] ? check_preemption_disabled+0x48/0x280 [ 285.027149] ? lock_release+0xa00/0xa00 [ 285.029992] sctp: [Deprecated]: syz-executor0 (pid 10353) Use of int in maxseg socket option. [ 285.029992] Use struct sctp_assoc_value instead [ 285.031148] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.031168] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 285.031186] ? rcu_pm_notify+0xc0/0xc0 [ 285.031262] ? __might_sleep+0x95/0x190 [ 285.063986] __alloc_pages_nodemask+0x366/0xea0 [ 285.068683] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.074063] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 285.076436] sctp: [Deprecated]: syz-executor0 (pid 10353) Use of int in maxseg socket option. [ 285.076436] Use struct sctp_assoc_value instead [ 285.079094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:24:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x11, 0x0, 0x0) 12:24:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x9, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 285.079114] ? check_preemption_disabled+0x48/0x280 [ 285.079139] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 285.079178] ? kasan_unpoison_shadow+0x35/0x50 [ 285.079205] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 285.119071] alloc_pages_current+0x173/0x350 [ 285.123500] __vmalloc_node_range+0x498/0x750 [ 285.128014] ? htab_map_alloc+0x29e/0x1190 [ 285.132262] __vmalloc_node_flags_caller+0x75/0x90 [ 285.137214] ? htab_map_alloc+0x29e/0x1190 [ 285.141497] bpf_map_area_alloc+0x6f/0x90 [ 285.145656] htab_map_alloc+0x29e/0x1190 [ 285.145691] htab_of_map_alloc+0x7d/0x100 [ 285.145711] ? htab_map_alloc+0x1190/0x1190 [ 285.158225] map_create+0x3bd/0x1110 [ 285.158242] ? find_held_lock+0x36/0x1c0 [ 285.158260] ? bpf_map_new_fd+0x70/0x70 [ 285.158279] ? __might_fault+0x12b/0x1e0 [ 285.158296] ? lock_downgrade+0x900/0x900 [ 285.158316] ? lock_release+0xa00/0xa00 [ 285.158334] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.174109] ? usercopy_warn+0x110/0x110 [ 285.174143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.191812] __x64_sys_bpf+0x303/0x520 [ 285.191829] ? bpf_prog_get+0x20/0x20 [ 285.191863] do_syscall_64+0x1b9/0x820 [ 285.208962] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.214343] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.219287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.224145] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.229178] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.234207] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.239243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.244112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.249309] RIP: 0033:0x457569 [ 285.252510] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.271410] RSP: 002b:00007f80a0acec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.279118] RAX: ffffffffffffffda RBX: 00007f80a0acec90 RCX: 0000000000457569 [ 285.279129] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 285.279138] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 285.279147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0acf6d4 [ 285.279156] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000004 12:24:20 executing program 4 (fault-call:2 fault-nth:16): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10afe, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 285.441034] FAULT_INJECTION: forcing a failure. [ 285.441034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 285.441205] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 285.458248] CPU: 1 PID: 10387 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 285.467778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.477159] Call Trace: [ 285.477180] dump_stack+0x244/0x39d [ 285.477201] ? dump_stack_print_info.cold.1+0x20/0x20 [ 285.477219] ? find_held_lock+0x36/0x1c0 [ 285.477248] should_fail.cold.4+0xa/0x17 [ 285.483436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.483455] ? zap_class+0x640/0x640 [ 285.483470] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 285.483492] ? kasan_check_read+0x11/0x20 [ 285.514631] ? rcu_softirq_qs+0x20/0x20 [ 285.518607] ? unwind_dump+0x190/0x190 [ 285.522501] ? find_held_lock+0x36/0x1c0 [ 285.526646] ? sta_he_capa_read+0x3f00/0x4c80 [ 285.531159] ? check_preemption_disabled+0x48/0x280 [ 285.536178] ? lock_release+0xa00/0xa00 [ 285.540154] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.545615] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 285.551158] ? rcu_pm_notify+0xc0/0xc0 [ 285.555050] ? __might_sleep+0x95/0x190 [ 285.559036] __alloc_pages_nodemask+0x366/0xea0 [ 285.563708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.569092] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 285.574129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.579668] ? check_preemption_disabled+0x48/0x280 [ 285.584693] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 285.590281] ? i915_edp_psr_status+0x900/0x9e0 [ 285.594883] ? kasan_unpoison_shadow+0x35/0x50 [ 285.599468] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 285.605017] alloc_pages_current+0x173/0x350 [ 285.609433] __vmalloc_node_range+0x498/0x750 [ 285.613938] ? htab_map_alloc+0x29e/0x1190 [ 285.618181] __vmalloc_node_flags_caller+0x75/0x90 [ 285.623111] ? htab_map_alloc+0x29e/0x1190 [ 285.627349] bpf_map_area_alloc+0x6f/0x90 [ 285.631500] htab_map_alloc+0x29e/0x1190 [ 285.635616] htab_of_map_alloc+0x7d/0x100 [ 285.639768] ? htab_map_alloc+0x1190/0x1190 [ 285.644098] map_create+0x3bd/0x1110 [ 285.647842] ? find_held_lock+0x36/0x1c0 [ 285.651906] ? bpf_map_new_fd+0x70/0x70 [ 285.655888] ? __might_fault+0x12b/0x1e0 [ 285.659951] ? lock_downgrade+0x900/0x900 [ 285.664106] ? lock_release+0xa00/0xa00 [ 285.668092] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.673549] ? usercopy_warn+0x110/0x110 [ 285.677643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.683197] __x64_sys_bpf+0x303/0x520 [ 285.687083] ? bpf_prog_get+0x20/0x20 [ 285.690901] do_syscall_64+0x1b9/0x820 [ 285.694790] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.700155] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.705116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.709961] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.714982] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.720006] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.725027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.729878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.735063] RIP: 0033:0x457569 [ 285.738282] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.757179] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.764885] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 285.772157] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 285.779421] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 12:24:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x8002, 0x4, 0x5, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r2, 0x70, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:20 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1018) 12:24:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x23, 0x0, 0x0) [ 285.786698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 285.793991] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b30, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2c, 0x0, 0x0) 12:24:20 executing program 4 (fault-call:2 fault-nth:17): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:20 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1074) [ 285.910328] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:20 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1048) 12:24:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x200000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000040)={r1, @in={{0x2, 0x4e24, @empty}}}, &(0x7f0000000100)=0x84) 12:24:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x25, 0x0, 0x0) [ 286.054345] FAULT_INJECTION: forcing a failure. [ 286.054345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.141454] CPU: 0 PID: 10427 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 286.148842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.158199] Call Trace: [ 286.160801] dump_stack+0x244/0x39d [ 286.164461] ? dump_stack_print_info.cold.1+0x20/0x20 [ 286.169667] ? find_held_lock+0x36/0x1c0 [ 286.173778] should_fail.cold.4+0xa/0x17 [ 286.177859] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.182983] ? zap_class+0x640/0x640 [ 286.186718] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 286.191688] ? kasan_check_read+0x11/0x20 [ 286.195855] ? rcu_softirq_qs+0x20/0x20 [ 286.199866] ? unwind_dump+0x190/0x190 [ 286.203774] ? find_held_lock+0x36/0x1c0 [ 286.207927] ? cmac_create+0x200/0x530 [ 286.207954] ? check_preemption_disabled+0x48/0x280 [ 286.216848] ? lock_release+0xa00/0xa00 [ 286.220831] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.226315] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.231872] ? rcu_pm_notify+0xc0/0xc0 [ 286.235783] ? __might_sleep+0x95/0x190 [ 286.239794] __alloc_pages_nodemask+0x366/0xea0 [ 286.244475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.249857] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 286.254894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.260434] ? check_preemption_disabled+0x48/0x280 [ 286.265441] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.271019] ? move_data_block+0x3ac0/0x51a0 [ 286.275423] ? kasan_unpoison_shadow+0x35/0x50 [ 286.279991] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 286.285516] alloc_pages_current+0x173/0x350 [ 286.289915] __vmalloc_node_range+0x498/0x750 [ 286.294398] ? htab_map_alloc+0x29e/0x1190 [ 286.298619] __vmalloc_node_flags_caller+0x75/0x90 [ 286.303532] ? htab_map_alloc+0x29e/0x1190 [ 286.307758] bpf_map_area_alloc+0x6f/0x90 [ 286.311906] htab_map_alloc+0x29e/0x1190 [ 286.315958] htab_of_map_alloc+0x7d/0x100 [ 286.320106] ? htab_map_alloc+0x1190/0x1190 [ 286.324408] map_create+0x3bd/0x1110 [ 286.328118] ? find_held_lock+0x36/0x1c0 [ 286.332176] ? bpf_map_new_fd+0x70/0x70 [ 286.336168] ? __might_fault+0x12b/0x1e0 [ 286.340216] ? lock_downgrade+0x900/0x900 [ 286.344350] ? lock_release+0xa00/0xa00 [ 286.348306] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.353758] ? usercopy_warn+0x110/0x110 [ 286.357815] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.363341] __x64_sys_bpf+0x303/0x520 [ 286.367212] ? bpf_prog_get+0x20/0x20 [ 286.371006] do_syscall_64+0x1b9/0x820 [ 286.374876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.380247] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.385158] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.389986] ? trace_hardirqs_on_caller+0x310/0x310 [ 286.394993] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 286.399994] ? prepare_exit_to_usermode+0x291/0x3b0 [ 286.404998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.409830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.415001] RIP: 0033:0x457569 [ 286.418189] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.437072] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.444791] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 286.452058] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 286.459312] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 286.466566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 286.473818] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x14, 0x0, 0x0) 12:24:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b0f, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:21 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x700) 12:24:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:21 executing program 4 (fault-call:2 fault-nth:18): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}, 0x7fff}}}, &(0x7f00000002c0)=0x84) 12:24:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x28) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)=0x3) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000040)={0xa0003, 0x0, [0xd22c, 0x8, 0xc11f, 0x1, 0x800, 0x5, 0x6, 0x6]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 286.767801] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 286.771651] FAULT_INJECTION: forcing a failure. [ 286.771651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.788770] CPU: 1 PID: 10454 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 286.796177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.805528] Call Trace: [ 286.808132] dump_stack+0x244/0x39d [ 286.811795] ? dump_stack_print_info.cold.1+0x20/0x20 [ 286.817004] ? find_held_lock+0x36/0x1c0 [ 286.821092] should_fail.cold.4+0xa/0x17 [ 286.825168] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.830278] ? zap_class+0x640/0x640 [ 286.830293] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 286.830309] ? kasan_check_read+0x11/0x20 [ 286.830325] ? rcu_softirq_qs+0x20/0x20 [ 286.830342] ? unwind_dump+0x190/0x190 [ 286.830362] ? find_held_lock+0x36/0x1c0 [ 286.838999] ? rmd320_transform+0x1090/0x1f30 [ 286.839027] ? check_preemption_disabled+0x48/0x280 [ 286.839046] ? lock_release+0xa00/0xa00 [ 286.839063] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.839082] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.839101] ? rcu_pm_notify+0xc0/0xc0 [ 286.851113] ? __might_sleep+0x95/0x190 [ 286.851136] __alloc_pages_nodemask+0x366/0xea0 [ 286.851156] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.874137] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 286.874157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.874189] ? check_preemption_disabled+0x48/0x280 12:24:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 286.874212] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 286.908168] ? kasan_unpoison_shadow+0x35/0x50 [ 286.908185] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 286.908206] alloc_pages_current+0x173/0x350 [ 286.928851] __vmalloc_node_range+0x498/0x750 [ 286.928882] ? htab_map_alloc+0x29e/0x1190 [ 286.928900] __vmalloc_node_flags_caller+0x75/0x90 [ 286.928917] ? htab_map_alloc+0x29e/0x1190 [ 286.928936] bpf_map_area_alloc+0x6f/0x90 [ 286.928953] htab_map_alloc+0x29e/0x1190 [ 286.928991] htab_of_map_alloc+0x7d/0x100 [ 286.942120] ? htab_map_alloc+0x1190/0x1190 [ 286.951264] map_create+0x3bd/0x1110 [ 286.951282] ? find_held_lock+0x36/0x1c0 [ 286.951298] ? bpf_map_new_fd+0x70/0x70 [ 286.951317] ? __might_fault+0x12b/0x1e0 [ 286.951352] ? lock_downgrade+0x900/0x900 [ 286.963867] ? lock_release+0xa00/0xa00 [ 286.963882] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.963902] ? usercopy_warn+0x110/0x110 [ 286.963932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.988270] __x64_sys_bpf+0x303/0x520 [ 286.988286] ? bpf_prog_get+0x20/0x20 [ 286.988321] do_syscall_64+0x1b9/0x820 [ 286.988338] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.011267] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.011284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.011304] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.011321] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.011340] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.034149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.034174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.034201] RIP: 0033:0x457569 12:24:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:21 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xc00) [ 287.034217] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.034230] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 287.044249] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 287.044260] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 287.044269] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 287.044279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:21 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1002) [ 287.044289] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:22 executing program 4 (fault-call:2 fault-nth:19): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x32, 0x0, 0x0) [ 287.237558] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x3ff, 0x7, [0x400, 0x0, 0x80000000, 0x0, 0x240, 0x0, 0xc43]}, &(0x7f00000001c0)=0x16) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000540)={r1, @in6={{0xa, 0xfff, 0x3f, @mcast2, 0xf48}}, [0x855, 0x8, 0x1, 0x4, 0x8000, 0x20, 0x1, 0x3, 0x1, 0x9a0b, 0x3, 0x10001, 0x7, 0x0, 0x8]}, &(0x7f0000000640)=0x100) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=@deltaction={0x13c, 0x31, 0x2, 0x70bd2d, 0x25dfdbfe, {0x0, 0x40e8c247, 0x6}, [@TCA_ACT_TAB={0x4c, 0x1, [{0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x18, 0xc, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0xb8, 0x1, [{0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x8, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x18, 0x6, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}]}, @TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8}}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c884) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="1468a27511bc6720c0fe8e060003000000a50001007de5f352cd29ed7214d0df8b846521d3176af92d1e47df65d4ed1b3062ca0000e7a76c01f08acec377163cb2a68b57993aa7562d7aa85cb4fe9c912ab3599c560c2527f4fefe9da1d70fcf5fc2629fb89505a966823277adad3d60405e46df8dac01930cff9add3ff7800e1b72fa3f97c09a173c444bca000000001955b4e38d4156714ee07415d35ac4044f7a0aaaa523669295fca96086c086d9e84b79a737149673d888ff7090438e61600a7e420215de302d6c30f611643f0e033f80cdfe18bf4fa915f558a032a17cdaf99720cb7842ef43762d8cd7c06425f782a3bc76f121e53bccb8b4"], &(0x7f00000000c0)=0xe) 12:24:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xd30a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1003) [ 287.311385] FAULT_INJECTION: forcing a failure. [ 287.311385] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.349651] CPU: 0 PID: 10501 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 287.357036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.366407] Call Trace: [ 287.369026] dump_stack+0x244/0x39d [ 287.372678] ? dump_stack_print_info.cold.1+0x20/0x20 [ 287.377888] ? find_held_lock+0x36/0x1c0 [ 287.381973] should_fail.cold.4+0xa/0x17 [ 287.386043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.391152] ? zap_class+0x640/0x640 [ 287.394881] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 287.399813] ? kasan_check_read+0x11/0x20 [ 287.403968] ? rcu_softirq_qs+0x20/0x20 [ 287.407946] ? unwind_dump+0x190/0x190 [ 287.411842] ? find_held_lock+0x36/0x1c0 [ 287.415975] ? camellia_encrypt+0x4da0/0x7cd0 [ 287.420501] ? check_preemption_disabled+0x48/0x280 [ 287.425521] ? lock_release+0xa00/0xa00 [ 287.429503] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.434959] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 287.440501] ? rcu_pm_notify+0xc0/0xc0 [ 287.444414] ? __might_sleep+0x95/0x190 [ 287.448412] __alloc_pages_nodemask+0x366/0xea0 [ 287.453098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.458485] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 287.463519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.469061] ? check_preemption_disabled+0x48/0x280 [ 287.474087] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 287.479650] ? __irqentry_text_end+0x1aa418/0x1f9658 [ 287.484782] ? kasan_unpoison_shadow+0x35/0x50 [ 287.489368] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 287.494915] alloc_pages_current+0x173/0x350 [ 287.499336] __vmalloc_node_range+0x498/0x750 [ 287.503858] ? htab_map_alloc+0x29e/0x1190 [ 287.508100] __vmalloc_node_flags_caller+0x75/0x90 [ 287.513050] ? htab_map_alloc+0x29e/0x1190 [ 287.517290] bpf_map_area_alloc+0x6f/0x90 [ 287.521446] htab_map_alloc+0x29e/0x1190 [ 287.525524] htab_of_map_alloc+0x7d/0x100 [ 287.529673] ? htab_map_alloc+0x1190/0x1190 [ 287.533996] map_create+0x3bd/0x1110 [ 287.537721] ? find_held_lock+0x36/0x1c0 [ 287.541799] ? bpf_map_new_fd+0x70/0x70 [ 287.545781] ? __might_fault+0x12b/0x1e0 [ 287.549847] ? lock_downgrade+0x900/0x900 [ 287.554013] ? lock_release+0xa00/0xa00 [ 287.558018] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.563483] ? usercopy_warn+0x110/0x110 [ 287.567562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.573103] __x64_sys_bpf+0x303/0x520 [ 287.576990] ? bpf_prog_get+0x20/0x20 [ 287.580814] do_syscall_64+0x1b9/0x820 [ 287.584706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.590113] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.595042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.599909] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.604943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.609968] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.614989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.619840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.625042] RIP: 0033:0x457569 [ 287.628239] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.647144] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 287.654851] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 12:24:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x29, 0x0, 0x0) [ 287.662118] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 287.669384] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 287.676648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 287.683954] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000100)=0xe8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r1, 0x50, "d70e5383d1e454bde7cc9aebb77665665cb6c9230919ee7606db5ecc7e93b2797c133b0ab5962b08efea7bd313ae615a7831abadbc4a8e99489675af877bda3ef4888be8fc159920641884f567b17583"}, &(0x7f00000001c0)=0x58) 12:24:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x30, 0x0, 0x0) [ 287.753613] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:22 executing program 4 (fault-call:2 fault-nth:20): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:22 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1200) 12:24:22 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000004000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000080)="b801008ed0f33ec0c5000f45bc0088f3a566b9380900000f32baf80c66b80cea2c8d66efbafc0cec0f090f287f03f30f1ba20600bad004b8bee2ef", 0x3b}], 0x1, 0x5c, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x21) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x1b}, 0x1}}, 0x4, 0x7}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000040)={r6, 0x80000001}, &(0x7f0000000300)=0xfffffed9) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f00000000c0)={r7, 0x9, 0x101}, 0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x200b0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 287.899679] FAULT_INJECTION: forcing a failure. [ 287.899679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:24:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x4, 0x0, 0x0) [ 287.956783] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 287.973709] CPU: 1 PID: 10536 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 287.981099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.990458] Call Trace: [ 287.993068] dump_stack+0x244/0x39d [ 287.996720] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.001939] ? find_held_lock+0x36/0x1c0 [ 288.006015] should_fail.cold.4+0xa/0x17 [ 288.010091] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.015200] ? zap_class+0x640/0x640 [ 288.018915] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 288.023847] ? kasan_check_read+0x11/0x20 [ 288.027999] ? rcu_softirq_qs+0x20/0x20 [ 288.031975] ? unwind_dump+0x190/0x190 [ 288.035867] ? find_held_lock+0x36/0x1c0 [ 288.040019] ? ceph_write_iter+0xe00/0x2270 [ 288.044358] ? check_preemption_disabled+0x48/0x280 [ 288.049383] ? lock_release+0xa00/0xa00 [ 288.053358] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.058816] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.064354] ? rcu_pm_notify+0xc0/0xc0 [ 288.068253] ? __might_sleep+0x95/0x190 [ 288.072249] __alloc_pages_nodemask+0x366/0xea0 [ 288.076919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.082290] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 288.087312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.093184] ? check_preemption_disabled+0x48/0x280 [ 288.098248] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.103844] ? efuse_pg_packet_write+0x990/0x23c0 [ 288.108710] ? kasan_unpoison_shadow+0x35/0x50 [ 288.113301] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 288.118859] alloc_pages_current+0x173/0x350 [ 288.123320] __vmalloc_node_range+0x498/0x750 [ 288.127874] ? htab_map_alloc+0x29e/0x1190 [ 288.132111] __vmalloc_node_flags_caller+0x75/0x90 [ 288.137042] ? htab_map_alloc+0x29e/0x1190 [ 288.141281] bpf_map_area_alloc+0x6f/0x90 [ 288.145432] htab_map_alloc+0x29e/0x1190 [ 288.149530] htab_of_map_alloc+0x7d/0x100 [ 288.153696] ? htab_map_alloc+0x1190/0x1190 [ 288.158021] map_create+0x3bd/0x1110 [ 288.161745] ? find_held_lock+0x36/0x1c0 [ 288.165813] ? bpf_map_new_fd+0x70/0x70 [ 288.169798] ? __might_fault+0x12b/0x1e0 [ 288.173860] ? lock_downgrade+0x900/0x900 [ 288.178017] ? lock_release+0xa00/0xa00 [ 288.182016] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.187476] ? usercopy_warn+0x110/0x110 [ 288.191556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.197099] __x64_sys_bpf+0x303/0x520 [ 288.200994] ? bpf_prog_get+0x20/0x20 [ 288.204813] do_syscall_64+0x1b9/0x820 [ 288.208740] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.214113] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.219042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.223887] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.228906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.233929] ? prepare_exit_to_usermode+0x291/0x3b0 [ 288.238955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.243818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.249006] RIP: 0033:0x457569 [ 288.252198] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.271100] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.278811] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 288.286097] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 288.293368] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 288.300636] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x600) [ 288.307902] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 288.318376] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x4c46) 12:24:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xd60a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:23 executing program 0: pipe(&(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000001e80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001e40)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000001ec0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000001e00)=0xfff, r1, 0x0, 0x0, 0x1}}, 0x20) r2 = socket$inet6_sctp(0xa, 0x9, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) process_vm_writev(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/180, 0xfffffe53}, {&(0x7f0000000180)=""/8, 0x8}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000380)=""/16, 0x10}], 0x5, &(0x7f0000001ac0)=[{&(0x7f0000000440)=""/37, 0x25}, {&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/225, 0xe1}, {&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/245, 0xf5}, {&(0x7f0000000800)=""/188, 0xbc}, {&(0x7f00000008c0)=""/46, 0x2e}, {&(0x7f0000000900)=""/203, 0xcb}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/172, 0xac}], 0xa, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000001bc0)='vegas\x00', 0x6) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000001d40)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001d00)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000001d80)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000001c00)=[{0x10, 0x0, [0x7, 0x2, 0x8, 0x8, 0x6, 0x6a, 0x6, 0xfa74, 0x590, 0x3, 0x45, 0xfff, 0x10000, 0x5, 0x1]}, {0x2, 0x0, [0x9, 0x4, 0x10000, 0xffffffffffff06f3, 0x8, 0x80000001, 0x6, 0x8, 0x1f, 0x217, 0xfffffffffffffffb, 0x7, 0x1, 0x0, 0x4, 0x1]}, {0x0, 0x0, [0x1, 0x0, 0x20, 0x6, 0xffff, 0x3, 0x5, 0x7fff, 0x1, 0x20, 0x400, 0x7, 0x7fffffff, 0x2, 0x8, 0x7]}], r5, 0x1, 0x1, 0xd8}}, 0x20) r6 = gettid() capset(&(0x7f0000000000)={0x20080522, r6}, &(0x7f0000000040)={0x9, 0x1, 0x80000000, 0x9, 0x100000000, 0x4}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2b, 0x0, 0x0) 12:24:23 executing program 4 (fault-call:2 fault-nth:21): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 288.560137] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 288.572541] FAULT_INJECTION: forcing a failure. [ 288.572541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.597587] CPU: 0 PID: 10581 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 288.604972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.614350] Call Trace: [ 288.616947] dump_stack+0x244/0x39d [ 288.620586] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.625793] ? find_held_lock+0x36/0x1c0 [ 288.629869] should_fail.cold.4+0xa/0x17 [ 288.633942] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.639050] ? zap_class+0x640/0x640 [ 288.642771] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 288.647702] ? kasan_check_read+0x11/0x20 [ 288.651872] ? rcu_softirq_qs+0x20/0x20 [ 288.655852] ? unwind_dump+0x190/0x190 [ 288.659786] ? find_held_lock+0x36/0x1c0 [ 288.663939] ? nfs_readdir_page_filler+0x970/0xc40 [ 288.668885] ? check_preemption_disabled+0x48/0x280 [ 288.673906] ? lock_release+0xa00/0xa00 [ 288.677884] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.683338] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.689144] ? rcu_pm_notify+0xc0/0xc0 [ 288.693040] ? __might_sleep+0x95/0x190 [ 288.697021] __alloc_pages_nodemask+0x366/0xea0 [ 288.701695] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.707078] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 288.712115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.717657] ? check_preemption_disabled+0x48/0x280 [ 288.722687] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 288.728290] ? xfs_bmapi_write+0x2350/0x3040 [ 288.732716] ? kasan_unpoison_shadow+0x35/0x50 [ 288.737318] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 288.742871] alloc_pages_current+0x173/0x350 [ 288.747289] __vmalloc_node_range+0x498/0x750 [ 288.751803] ? htab_map_alloc+0x29e/0x1190 [ 288.756058] __vmalloc_node_flags_caller+0x75/0x90 [ 288.760995] ? htab_map_alloc+0x29e/0x1190 [ 288.765233] bpf_map_area_alloc+0x6f/0x90 [ 288.769390] htab_map_alloc+0x29e/0x1190 [ 288.773487] htab_of_map_alloc+0x7d/0x100 [ 288.777640] ? htab_map_alloc+0x1190/0x1190 [ 288.781962] map_create+0x3bd/0x1110 [ 288.785677] ? find_held_lock+0x36/0x1c0 [ 288.789752] ? bpf_map_new_fd+0x70/0x70 [ 288.793749] ? __might_fault+0x12b/0x1e0 [ 288.797821] ? lock_downgrade+0x900/0x900 [ 288.801974] ? lock_release+0xa00/0xa00 [ 288.805950] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.811407] ? usercopy_warn+0x110/0x110 [ 288.815483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.821029] __x64_sys_bpf+0x303/0x520 [ 288.824931] ? bpf_prog_get+0x20/0x20 [ 288.828811] do_syscall_64+0x1b9/0x820 [ 288.832718] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.838118] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.843055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.847908] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.852930] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.857964] ? prepare_exit_to_usermode+0x291/0x3b0 [ 288.862996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.867853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.873046] RIP: 0033:0x457569 [ 288.876256] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.895181] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.902901] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 12:24:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x900) [ 288.910182] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 288.917488] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 288.924768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 288.932080] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)="1e401611541686e924c19539732633efdb8df199881c20618790651410b59213b661f89645fbbd66c2463b6f657216a68af8b48bcdbef5258f2fea27983f93bb8f14cfef7692c18db377159f73a62a4ce184d95cbeffd93b45f9a412ffee7326016602351e2101863cd1fd09057677f423528cded6b8bb4d9a4020dc5eb384337f0d15892fe20d826d487c673b6731264704614d456ff07a67f10f292eddeb0ffb97f0f22b4e454a5a06fc3b394dd0c928ae6c", 0xb3) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x200000, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000300)={0x1, 0x0, 0x2080, {0x5000, 0x1, 0x1}, [], "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", "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"}) 12:24:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x15, 0x0, 0x0) 12:24:23 executing program 4 (fault-call:2 fault-nth:22): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x30b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x2d) [ 289.157900] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 289.236083] FAULT_INJECTION: forcing a failure. [ 289.236083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.248159] CPU: 1 PID: 10622 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 289.251478] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 289.255530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.255537] Call Trace: [ 289.255564] dump_stack+0x244/0x39d [ 289.255592] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.283659] ? find_held_lock+0x36/0x1c0 [ 289.287746] should_fail.cold.4+0xa/0x17 [ 289.291821] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.296925] ? zap_class+0x640/0x640 [ 289.300639] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 289.305569] ? kasan_check_read+0x11/0x20 [ 289.309720] ? rcu_softirq_qs+0x20/0x20 [ 289.313722] ? unwind_dump+0x190/0x190 [ 289.317626] ? find_held_lock+0x36/0x1c0 [ 289.321698] ? ceph_atomic_open+0x8d0/0xb50 [ 289.326066] ? check_preemption_disabled+0x48/0x280 [ 289.331090] ? lock_release+0xa00/0xa00 [ 289.335069] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.340524] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.346095] ? rcu_pm_notify+0xc0/0xc0 [ 289.349991] ? __might_sleep+0x95/0x190 [ 289.353975] __alloc_pages_nodemask+0x366/0xea0 [ 289.358645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.364021] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 289.369045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.374586] ? check_preemption_disabled+0x48/0x280 [ 289.379618] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.385218] ? kasan_unpoison_shadow+0x35/0x50 [ 289.389804] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 289.395348] alloc_pages_current+0x173/0x350 [ 289.399772] __vmalloc_node_range+0x498/0x750 [ 289.404284] ? htab_map_alloc+0x29e/0x1190 [ 289.408524] __vmalloc_node_flags_caller+0x75/0x90 [ 289.413461] ? htab_map_alloc+0x29e/0x1190 [ 289.417702] bpf_map_area_alloc+0x6f/0x90 [ 289.421869] htab_map_alloc+0x29e/0x1190 [ 289.425954] htab_of_map_alloc+0x7d/0x100 [ 289.430108] ? htab_map_alloc+0x1190/0x1190 [ 289.434458] map_create+0x3bd/0x1110 [ 289.438174] ? find_held_lock+0x36/0x1c0 [ 289.442237] ? bpf_map_new_fd+0x70/0x70 [ 289.446221] ? __might_fault+0x12b/0x1e0 [ 289.450302] ? lock_downgrade+0x900/0x900 [ 289.454454] ? lock_release+0xa00/0xa00 [ 289.458428] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.463883] ? usercopy_warn+0x110/0x110 [ 289.467963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.473508] __x64_sys_bpf+0x303/0x520 [ 289.477394] ? bpf_prog_get+0x20/0x20 [ 289.481229] do_syscall_64+0x1b9/0x820 [ 289.485130] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.490497] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.495458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.500306] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.505340] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.510363] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.515386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.520247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.525440] RIP: 0033:0x457569 [ 289.528634] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.547536] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.555248] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 289.562519] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 289.569786] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.577057] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x500) 12:24:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x8, 0x0, 0x0) 12:24:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xffff, 0x1, 0x4b610d90, 0x8}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4, 0x4, 0xfffffffffffffffc, 0x0, 0x80000000}, &(0x7f0000000180)=0x98) r2 = dup2(0xffffffffffffff9c, r0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e20, 0xa3, @loopback, 0x2}}}, &(0x7f0000000080)=0xfffffffffffffca8) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x10201, 0x0) write$P9_RSYMLINK(r3, &(0x7f00000002c0)={0x14, 0x11, 0x1, {0x40000000000002, 0x0, 0x1}}, 0xffffffffffffffee) 12:24:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xcb0a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 289.584325] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:24 executing program 4 (fault-call:2 fault-nth:23): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x102f) [ 289.660189] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000000)=0x84) 12:24:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x102d) 12:24:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x10, 0x0, 0x0) [ 289.758962] FAULT_INJECTION: forcing a failure. [ 289.758962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.780123] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x100) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x34ff7e04, @dev={0xfe, 0x80, [], 0x20}, 0x7b1}}}, &(0x7f00000002c0)=0x84) [ 289.843502] CPU: 0 PID: 10649 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 289.850898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.860266] Call Trace: [ 289.862893] dump_stack+0x244/0x39d [ 289.866548] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.871771] ? find_held_lock+0x36/0x1c0 [ 289.875866] should_fail.cold.4+0xa/0x17 [ 289.879947] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.885064] ? zap_class+0x640/0x640 [ 289.888801] ? rcu_read_unlock_special+0x1c0/0x1c0 12:24:24 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xd00) [ 289.893765] ? kasan_check_read+0x11/0x20 [ 289.897931] ? rcu_softirq_qs+0x20/0x20 [ 289.897950] ? unwind_dump+0x190/0x190 [ 289.897974] ? find_held_lock+0x36/0x1c0 [ 289.898078] ? _receive_message.cold.100+0x1045/0x173d [ 289.898104] ? check_preemption_disabled+0x48/0x280 [ 289.905956] ? lock_release+0xa00/0xa00 [ 289.924255] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.929721] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.935290] ? rcu_pm_notify+0xc0/0xc0 [ 289.935313] ? __might_sleep+0x95/0x190 [ 289.935335] __alloc_pages_nodemask+0x366/0xea0 [ 289.935350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.935374] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 289.958720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.964290] ? check_preemption_disabled+0x48/0x280 [ 289.964316] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.964341] ? page_mapcount+0x370/0x5d0 [ 289.964369] ? kasan_unpoison_shadow+0x35/0x50 [ 289.964389] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 289.989101] alloc_pages_current+0x173/0x350 [ 289.993529] __vmalloc_node_range+0x498/0x750 [ 289.998046] ? htab_map_alloc+0x29e/0x1190 [ 290.002294] __vmalloc_node_flags_caller+0x75/0x90 [ 290.007235] ? htab_map_alloc+0x29e/0x1190 [ 290.011486] bpf_map_area_alloc+0x6f/0x90 [ 290.015647] htab_map_alloc+0x29e/0x1190 [ 290.019752] htab_of_map_alloc+0x7d/0x100 [ 290.023915] ? htab_map_alloc+0x1190/0x1190 [ 290.028248] map_create+0x3bd/0x1110 [ 290.031981] ? find_held_lock+0x36/0x1c0 [ 290.036067] ? bpf_map_new_fd+0x70/0x70 [ 290.040066] ? __might_fault+0x12b/0x1e0 [ 290.040084] ? lock_downgrade+0x900/0x900 [ 290.040118] ? lock_release+0xa00/0xa00 [ 290.052269] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.057751] ? usercopy_warn+0x110/0x110 [ 290.061847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.067413] __x64_sys_bpf+0x303/0x520 [ 290.071314] ? bpf_prog_get+0x20/0x20 [ 290.075162] do_syscall_64+0x1b9/0x820 [ 290.079077] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.084460] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.089396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.094262] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.099295] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.104339] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.109381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.114241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.119452] RIP: 0033:0x457569 [ 290.122657] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.141562] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.141578] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 290.141588] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 290.141598] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.141607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 290.141617] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x107a) 12:24:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc30a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x38, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x5, @mcast2, 0x7}, @in6={0xa, 0x4e20, 0xffffffffffff8001, @mcast1, 0x6}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e23, 0x0, @mcast1, 0x7f72}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2d, 0x0, 0x0) 12:24:25 executing program 4 (fault-call:2 fault-nth:24): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1004) [ 290.559713] FAULT_INJECTION: forcing a failure. [ 290.559713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.576404] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 290.616990] CPU: 0 PID: 10694 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 290.624384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.633756] Call Trace: [ 290.636393] dump_stack+0x244/0x39d [ 290.640049] ? dump_stack_print_info.cold.1+0x20/0x20 [ 290.645258] ? find_held_lock+0x36/0x1c0 [ 290.649341] should_fail.cold.4+0xa/0x17 [ 290.653420] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.658576] ? zap_class+0x640/0x640 [ 290.662317] ? rcu_read_unlock_special+0x1c0/0x1c0 12:24:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1007) [ 290.667273] ? kasan_check_read+0x11/0x20 [ 290.671438] ? rcu_softirq_qs+0x20/0x20 [ 290.675429] ? unwind_dump+0x190/0x190 [ 290.679356] ? find_held_lock+0x36/0x1c0 [ 290.679376] ? split_page+0x30/0x5e0 [ 290.679416] ? check_preemption_disabled+0x48/0x280 [ 290.679450] ? lock_release+0xa00/0xa00 [ 290.696213] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.701679] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 290.707270] ? rcu_pm_notify+0xc0/0xc0 [ 290.711189] ? __might_sleep+0x95/0x190 12:24:25 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x20000) [ 290.715192] __alloc_pages_nodemask+0x366/0xea0 [ 290.719874] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.725257] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 290.730288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.735836] ? check_preemption_disabled+0x48/0x280 [ 290.740874] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 290.746483] ? kasan_unpoison_shadow+0x35/0x50 [ 290.751075] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 290.756639] alloc_pages_current+0x173/0x350 [ 290.761064] __vmalloc_node_range+0x498/0x750 12:24:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 290.765599] ? htab_map_alloc+0x29e/0x1190 [ 290.769846] __vmalloc_node_flags_caller+0x75/0x90 [ 290.774804] ? htab_map_alloc+0x29e/0x1190 [ 290.779052] bpf_map_area_alloc+0x6f/0x90 [ 290.783222] htab_map_alloc+0x29e/0x1190 [ 290.787309] htab_of_map_alloc+0x7d/0x100 [ 290.791467] ? htab_map_alloc+0x1190/0x1190 [ 290.795790] map_create+0x3bd/0x1110 [ 290.799516] ? find_held_lock+0x36/0x1c0 [ 290.803611] ? bpf_map_new_fd+0x70/0x70 [ 290.807598] ? __might_fault+0x12b/0x1e0 [ 290.811672] ? lock_downgrade+0x900/0x900 [ 290.815835] ? lock_release+0xa00/0xa00 [ 290.819819] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.825282] ? usercopy_warn+0x110/0x110 [ 290.829373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.834945] __x64_sys_bpf+0x303/0x520 [ 290.838846] ? bpf_prog_get+0x20/0x20 [ 290.842678] do_syscall_64+0x1b9/0x820 [ 290.846580] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.851954] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.856896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.861766] ? trace_hardirqs_on_caller+0x310/0x310 12:24:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0xa, 0x0, 0x0) [ 290.861785] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.861804] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.861825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.871859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.871873] RIP: 0033:0x457569 [ 290.871890] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.871899] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/106, 0x6a}, {&(0x7f0000000080)=""/105, 0x69}, {&(0x7f0000000100)=""/226, 0xe2}, {&(0x7f0000000300)=""/227, 0xe3}], 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 290.890148] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 290.890163] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 290.916767] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.916777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 290.916786] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, &(0x7f00000002c0)) 12:24:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x300) 12:24:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0xf, 0x0, 0x0) 12:24:26 executing program 4 (fault-call:2 fault-nth:25): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x104c) [ 291.459514] FAULT_INJECTION: forcing a failure. [ 291.459514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 291.479484] CPU: 0 PID: 10749 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 291.486865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.486873] Call Trace: [ 291.486898] dump_stack+0x244/0x39d [ 291.486925] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.486951] ? find_held_lock+0x36/0x1c0 [ 291.511725] should_fail.cold.4+0xa/0x17 [ 291.515823] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.520937] ? zap_class+0x640/0x640 [ 291.524667] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 291.529607] ? kasan_check_read+0x11/0x20 [ 291.529625] ? rcu_softirq_qs+0x20/0x20 [ 291.529644] ? unwind_dump+0x190/0x190 [ 291.529666] ? find_held_lock+0x36/0x1c0 [ 291.529785] ? cgroup_post_fork+0xd0/0x4f0 [ 291.529814] ? check_preemption_disabled+0x48/0x280 [ 291.545837] ? lock_release+0xa00/0xa00 [ 291.545855] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.545875] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.545894] ? rcu_pm_notify+0xc0/0xc0 [ 291.545915] ? __might_sleep+0x95/0x190 [ 291.545937] __alloc_pages_nodemask+0x366/0xea0 [ 291.559155] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.559178] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 291.559210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.559227] ? check_preemption_disabled+0x48/0x280 [ 291.559289] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 291.570292] ? kasan_unpoison_shadow+0x35/0x50 [ 291.570309] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.570332] alloc_pages_current+0x173/0x350 [ 291.570355] __vmalloc_node_range+0x498/0x750 [ 291.582888] ? htab_map_alloc+0x29e/0x1190 [ 291.582908] __vmalloc_node_flags_caller+0x75/0x90 [ 291.582925] ? htab_map_alloc+0x29e/0x1190 [ 291.582944] bpf_map_area_alloc+0x6f/0x90 [ 291.582962] htab_map_alloc+0x29e/0x1190 [ 291.582994] htab_of_map_alloc+0x7d/0x100 [ 291.598914] ? htab_map_alloc+0x1190/0x1190 12:24:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000ba010300031d000003beb6e8799103000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) 12:24:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x2, 0x0, 0x10002, 0x6}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x10000, r1, 0x10000, 0x3}) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 291.598929] map_create+0x3bd/0x1110 [ 291.598947] ? find_held_lock+0x36/0x1c0 [ 291.598965] ? bpf_map_new_fd+0x70/0x70 [ 291.598986] ? __might_fault+0x12b/0x1e0 [ 291.599003] ? lock_downgrade+0x900/0x900 [ 291.599024] ? lock_release+0xa00/0xa00 [ 291.599039] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.599061] ? usercopy_warn+0x110/0x110 [ 291.609630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.609652] __x64_sys_bpf+0x303/0x520 [ 291.609669] ? bpf_prog_get+0x20/0x20 [ 291.609706] do_syscall_64+0x1b9/0x820 12:24:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x2) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c0600000000000000000000040003000300000200000000000038e0ffffff04cbeeee90bda892038b552bc8148578920000000000000000200001"], 0x238) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 291.609721] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.609754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.609776] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.619875] ? trace_hardirqs_on_caller+0x310/0x310 [ 291.619894] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.619914] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.619937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.619961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.619974] RIP: 0033:0x457569 [ 291.619990] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.619999] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.633133] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 291.633144] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 291.633154] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 291.633163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:26 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x40, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0x8, 0x0, 0x2, 0x7fff}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000001c0)={0x7, r2}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000300)="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", &(0x7f0000000040)=""/222}, 0x18) [ 291.633173] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:26 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000b6653226d936f1f0000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x100) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000000)={0x0, 0x5, {0x7, 0xf96, 0x7, 0x800}}) 12:24:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x16, 0x0, 0x0) 12:24:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:27 executing program 4 (fault-call:2 fault-nth:26): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x7ff, 0x6, 0x201, 0x3f, 0x2, 0x2, 0xfeb2, 0x9, r1}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x490, 0x0, 0x0) 12:24:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="69fe4c46682d074323b8a04ed4820000000000000000000000000340030000000000000000003800000000000000000000000000200001"], 0x2d) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0xbb, @rand_addr=0xff, 0x4e21, 0x0, 'ovf\x00', 0x1, 0x0, 0x45}, 0x2c) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x1, 0xf, 0x3, 0x5, "f9013d9a6d84329c9e7350bfbc664f5a674a71b25bf32da2cf8b04bd110dad64"}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x3, 0x8001, 0x6, 0x3, 0x6, [{0x7, 0xdf3, 0x4, 0x0, 0x0, 0x500}, {0xffff, 0x9, 0x9000000, 0x0, 0x0, 0x2602}, {0x5f08, 0x7fff, 0x9, 0x0, 0x0, 0x8}, {0xfffe000000000000, 0x10000, 0x508d44c5, 0x0, 0x0, 0x2002}, {0x1, 0x2, 0x7, 0x0, 0x0, 0x200}, {0x4, 0x0, 0xddb8, 0x0, 0x0, 0x800}]}) 12:24:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x200, 0x200) fcntl$setlease(r0, 0x400, 0x1) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 292.328156] validate_nla: 1 callbacks suppressed [ 292.328165] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 292.330082] FAULT_INJECTION: forcing a failure. [ 292.330082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:24:27 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb23, 0x100) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x401, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8000, @mcast2}, {0xa, 0x4e20, 0x9, @ipv4={[], [], @remote}, 0xe2e}, r1, 0xdd9}}, 0x48) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000300)="aea33eb7eed596b83a998343d1399fa52c1a154057bc64615db7eb3f3b9b01234af87bef699a639276afe6bff4bb63c7254bd44ee5353f70a3ec1ce8edd57d8e1a58b21af3050ad810d30cb64af5381979d30e9fa728529b95fce7e434e9cd926d6088359c7447e84dc7cef9bf47d20986835bdff6b085967ac4ad123b5d0abb35d5bb31ad8523cafcb629afaf23f2e1e0d4d4741d23d9d9", 0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 292.426527] CPU: 0 PID: 10820 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 292.433910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.443262] Call Trace: [ 292.445865] dump_stack+0x244/0x39d [ 292.449506] ? dump_stack_print_info.cold.1+0x20/0x20 [ 292.454706] ? find_held_lock+0x36/0x1c0 [ 292.458805] should_fail.cold.4+0xa/0x17 [ 292.462889] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.462908] ? zap_class+0x640/0x640 [ 292.462927] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 292.476672] ? kasan_check_read+0x11/0x20 [ 292.476692] ? rcu_softirq_qs+0x20/0x20 [ 292.476710] ? unwind_dump+0x190/0x190 [ 292.476747] ? find_held_lock+0x36/0x1c0 [ 292.492808] ? check_preemption_disabled+0x48/0x280 [ 292.497847] ? lock_release+0xa00/0xa00 [ 292.501836] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.507293] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.512860] ? rcu_pm_notify+0xc0/0xc0 [ 292.516776] ? __might_sleep+0x95/0x190 [ 292.521193] __alloc_pages_nodemask+0x366/0xea0 [ 292.521210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.521233] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 292.521252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.521269] ? check_preemption_disabled+0x48/0x280 [ 292.521295] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 292.521333] ? kasan_unpoison_shadow+0x35/0x50 [ 292.521349] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 292.521373] alloc_pages_current+0x173/0x350 [ 292.521395] __vmalloc_node_range+0x498/0x750 [ 292.531434] ? htab_map_alloc+0x29e/0x1190 [ 292.541971] __vmalloc_node_flags_caller+0x75/0x90 [ 292.541989] ? htab_map_alloc+0x29e/0x1190 [ 292.542006] bpf_map_area_alloc+0x6f/0x90 [ 292.542027] htab_map_alloc+0x29e/0x1190 [ 292.593207] htab_of_map_alloc+0x7d/0x100 [ 292.593224] ? htab_map_alloc+0x1190/0x1190 [ 292.593243] map_create+0x3bd/0x1110 [ 292.605430] ? find_held_lock+0x36/0x1c0 [ 292.609506] ? bpf_map_new_fd+0x70/0x70 [ 292.613495] ? __might_fault+0x12b/0x1e0 [ 292.617562] ? lock_downgrade+0x900/0x900 [ 292.617584] ? lock_release+0xa00/0xa00 [ 292.617598] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.617621] ? usercopy_warn+0x110/0x110 [ 292.635262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.640819] __x64_sys_bpf+0x303/0x520 [ 292.644719] ? bpf_prog_get+0x20/0x20 [ 292.648571] do_syscall_64+0x1b9/0x820 [ 292.652508] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.657897] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.662858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.667768] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.672801] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:24:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2, 0x0, 0x0) 12:24:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x7, 0x0, 0x0) 12:24:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x18, 0x0, 0x0) 12:24:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xac8e, 0x100) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000080)) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='eth1u-vboxnet0}posix_acl_accessvboxnet1+\'\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 292.677884] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.682919] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.687792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.692992] RIP: 0033:0x457569 [ 292.696194] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.715105] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 292.722818] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 292.722828] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 292.722837] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 292.722847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 292.722856] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b23, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x62, 0x0, 0x0) 12:24:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000240), &(0x7f0000000280)) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) r1 = getuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000180)={0xa0, 0x0, 0x1, {{0x5, 0x1, 0x3, 0x8, 0x6, 0x971, {0x6, 0x6, 0x9, 0x5, 0x1, 0x5, 0x401, 0x47271bdb, 0x6, 0x4, 0xec0, r1, r2, 0x0, 0x9}}, {0x0, 0x4}}}, 0xa0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:27 executing program 4 (fault-call:2 fault-nth:27): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 293.218879] FAULT_INJECTION: forcing a failure. [ 293.218879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 293.223026] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 293.243910] CPU: 1 PID: 10871 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 293.251290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.260653] Call Trace: [ 293.263266] dump_stack+0x244/0x39d 12:24:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0xd, 0x0, 0x0) [ 293.266917] ? dump_stack_print_info.cold.1+0x20/0x20 [ 293.272122] ? finish_task_switch+0x1f4/0x910 [ 293.276670] should_fail.cold.4+0xa/0x17 [ 293.280761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.285893] ? trace_hardirqs_off_caller+0x310/0x310 [ 293.291060] ? zap_class+0x640/0x640 [ 293.291089] ? finish_task_switch+0x1f4/0x910 [ 293.291109] ? find_held_lock+0x36/0x1c0 [ 293.291216] ? st_log_options.part.9+0x780/0x7b0 [ 293.291247] ? check_preemption_disabled+0x48/0x280 [ 293.313264] ? lock_release+0xa00/0xa00 [ 293.317261] ? perf_trace_sched_process_exec+0x860/0x860 [ 293.322744] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 293.328300] ? rcu_pm_notify+0xc0/0xc0 [ 293.332221] ? __might_sleep+0x95/0x190 [ 293.336238] __alloc_pages_nodemask+0x366/0xea0 [ 293.340942] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 293.345973] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 293.350776] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 293.350791] ? retint_kernel+0x1b/0x2d [ 293.350809] ? trace_hardirqs_on+0x310/0x310 [ 293.350854] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 293.360204] alloc_pages_current+0x173/0x350 [ 293.360227] __vmalloc_node_range+0x498/0x750 [ 293.360276] ? htab_map_alloc+0x29e/0x1190 [ 293.370185] __vmalloc_node_flags_caller+0x75/0x90 [ 293.370204] ? htab_map_alloc+0x29e/0x1190 [ 293.370222] bpf_map_area_alloc+0x6f/0x90 [ 293.370241] htab_map_alloc+0x29e/0x1190 [ 293.370282] htab_of_map_alloc+0x7d/0x100 [ 293.370301] ? htab_map_alloc+0x1190/0x1190 [ 293.379238] map_create+0x3bd/0x1110 [ 293.379263] ? find_held_lock+0x36/0x1c0 [ 293.379295] ? bpf_map_new_fd+0x70/0x70 [ 293.379315] ? __might_fault+0x12b/0x1e0 [ 293.379332] ? lock_downgrade+0x900/0x900 [ 293.379368] ? lock_release+0xa00/0xa00 [ 293.379386] ? perf_trace_sched_process_exec+0x860/0x860 [ 293.388546] ? usercopy_warn+0x110/0x110 [ 293.388579] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.388600] __x64_sys_bpf+0x303/0x520 [ 293.388615] ? bpf_prog_get+0x20/0x20 [ 293.388661] do_syscall_64+0x1b9/0x820 [ 293.397025] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 12:24:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x2000000008, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES32=r0, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESOCT=0x0, @ANYPTR64, @ANYRESOCT=r0, @ANYRES32, @ANYPTR], @ANYRESOCT=r0, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRES64=r0], @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES64, @ANYPTR, @ANYRES64=r0, @ANYPTR, @ANYRESHEX=r0, @ANYPTR64], @ANYRES16=r0]], 0x18d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34}) [ 293.397046] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.397062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.397081] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.397100] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 293.397120] ? prepare_exit_to_usermode+0x291/0x3b0 [ 293.405317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.405342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.405355] RIP: 0033:0x457569 12:24:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x400000000000000) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) splice(r0, &(0x7f0000000000)=0x47, r0, &(0x7f0000000080), 0x20, 0x8) [ 293.405372] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.405380] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.413420] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 293.413431] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 293.413440] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 293.413450] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 293.413460] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000100)=""/200) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0xb, 0x0, 0x0) 12:24:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10ac6, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0x3, {0x6, 0x4, 0x4, 0x80000000}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000300)=""/103, 0x67, 0x3}, 0x2}, {{&(0x7f0000000380)=@llc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000400)=""/209, 0xd1}], 0x1, &(0x7f0000000500)=""/172, 0xac, 0x4}, 0x8}, {{&(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/51, 0x33}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/222, 0xde}, {&(0x7f00000017c0)=""/187, 0xbb}, {&(0x7f0000001880)=""/89, 0x59}, {&(0x7f0000001900)=""/148, 0x94}], 0x7, &(0x7f0000001a40)=""/219, 0xdb, 0x5}, 0x10001}], 0x3, 0x10003, &(0x7f0000001c00)={0x77359400}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000040)={r1, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}}}, 0x84) 12:24:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x12, 0x0, 0x0) [ 293.818837] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 293.889302] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, 0x0) 12:24:28 executing program 4 (fault-call:2 fault-nth:28): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r1, r2) setgroups(0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:28 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800040000000000000000000000200001bc451f67435609f00e56fb7966d598beb1a373bd627f9dd40108d8543dff2bc15ae452bbada440843d6bc8e31e8e52b13e3627174c0200a7f3e77cc8bb4801e5cc4c70dcb3b0af4b64269aa679d48eeb6c72c3e8b81390668584076d6bc6098d50fbb11851"], 0x2d) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, r1, 0x3}, 0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f00000004c0)=0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000500)={r2, 0x1000, "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"}, &(0x7f0000001540)=0x1008) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080)="83830c6051475a5149bcc4ea7e500b91b96c50fefae60ea0d3bd06ab00fb8d0e00dfb9f1f83e0cd0a9841a08ca4bb0b33dcce77c7884563bf96fa184ad68eb6ce4757bf3044ccac380a133e9ccf64700843c43d71e6a31b4500c57063023ddd05bd69f578e154d60ebe2e406d3f35ce87c7f394cd46e8210160709a6c8336477cf1670a1827dbc41d02023137fd83f8af5eb226a2699a40f70021f72a32780c8f7f0078b98d4", &(0x7f0000000300)=""/209}, 0x18) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x2a, 0x0, 0x0) 12:24:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x220b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 294.070978] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 294.105710] FAULT_INJECTION: forcing a failure. [ 294.105710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 294.120870] CPU: 0 PID: 10961 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 294.128258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.137622] Call Trace: [ 294.140246] dump_stack+0x244/0x39d [ 294.143902] ? dump_stack_print_info.cold.1+0x20/0x20 [ 294.149117] ? find_held_lock+0x36/0x1c0 [ 294.153206] should_fail.cold.4+0xa/0x17 [ 294.157277] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.162397] ? zap_class+0x640/0x640 [ 294.166116] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 294.171069] ? kasan_check_read+0x11/0x20 [ 294.175241] ? rcu_softirq_qs+0x20/0x20 [ 294.179220] ? unwind_dump+0x190/0x190 [ 294.183117] ? find_held_lock+0x36/0x1c0 [ 294.187219] ? check_preemption_disabled+0x48/0x280 [ 294.192256] ? lock_release+0xa00/0xa00 [ 294.196240] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.201700] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 294.207272] ? rcu_pm_notify+0xc0/0xc0 [ 294.211212] ? __might_sleep+0x95/0x190 [ 294.215210] __alloc_pages_nodemask+0x366/0xea0 [ 294.219881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.225256] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 294.230282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.235827] ? check_preemption_disabled+0x48/0x280 [ 294.240918] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 294.246496] ? kasan_unpoison_shadow+0x35/0x50 [ 294.251086] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 294.256632] alloc_pages_current+0x173/0x350 [ 294.261066] __vmalloc_node_range+0x498/0x750 [ 294.265593] ? htab_map_alloc+0x29e/0x1190 [ 294.269832] __vmalloc_node_flags_caller+0x75/0x90 [ 294.274791] ? htab_map_alloc+0x29e/0x1190 [ 294.279035] bpf_map_area_alloc+0x6f/0x90 [ 294.283224] htab_map_alloc+0x29e/0x1190 [ 294.287303] htab_of_map_alloc+0x7d/0x100 [ 294.291472] ? htab_map_alloc+0x1190/0x1190 [ 294.295796] map_create+0x3bd/0x1110 [ 294.299519] ? find_held_lock+0x36/0x1c0 [ 294.303589] ? bpf_map_new_fd+0x70/0x70 [ 294.307571] ? __might_fault+0x12b/0x1e0 [ 294.311639] ? lock_downgrade+0x900/0x900 [ 294.315795] ? lock_release+0xa00/0xa00 [ 294.319781] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.325254] ? usercopy_warn+0x110/0x110 [ 294.329339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.334891] __x64_sys_bpf+0x303/0x520 [ 294.338789] ? bpf_prog_get+0x20/0x20 [ 294.342613] do_syscall_64+0x1b9/0x820 [ 294.346522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.351926] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.356863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.361720] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.366766] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.371797] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.376827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.381684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.386875] RIP: 0033:0x457569 [ 294.390074] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.408987] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xb2703, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000040)={0x2, 0x22, 0x3}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 294.416714] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 294.424005] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 294.431302] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 294.438582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 294.445862] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000040)={r1, 0x3, 0x3}, &(0x7f0000000080)=0x8) 12:24:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x1405) 12:24:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xd80a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x21, 0x0, 0x0) 12:24:29 executing program 4 (fault-call:2 fault-nth:29): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 294.683080] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 294.691083] FAULT_INJECTION: forcing a failure. [ 294.691083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 294.719360] CPU: 1 PID: 10998 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 294.726799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.736170] Call Trace: [ 294.738785] dump_stack+0x244/0x39d [ 294.742441] ? dump_stack_print_info.cold.1+0x20/0x20 [ 294.747639] ? find_held_lock+0x36/0x1c0 [ 294.747665] should_fail.cold.4+0xa/0x17 [ 294.747684] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.747700] ? zap_class+0x640/0x640 [ 294.747714] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 294.747757] ? kasan_check_read+0x11/0x20 [ 294.747782] ? rcu_softirq_qs+0x20/0x20 [ 294.755924] ? unwind_dump+0x190/0x190 [ 294.755947] ? find_held_lock+0x36/0x1c0 [ 294.756041] ? cm_free_work+0x20/0x60 [ 294.764788] ? check_preemption_disabled+0x48/0x280 [ 294.764809] ? lock_release+0xa00/0xa00 [ 294.764828] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.773905] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 294.773925] ? rcu_pm_notify+0xc0/0xc0 [ 294.773952] ? __might_sleep+0x95/0x190 [ 294.781807] __alloc_pages_nodemask+0x366/0xea0 [ 294.781824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.781847] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 294.789706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.789776] ? check_preemption_disabled+0x48/0x280 [ 294.789801] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 294.789851] ? kasan_unpoison_shadow+0x35/0x50 [ 294.789866] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 294.789887] alloc_pages_current+0x173/0x350 [ 294.789908] __vmalloc_node_range+0x498/0x750 [ 294.789936] ? htab_map_alloc+0x29e/0x1190 [ 294.798916] __vmalloc_node_flags_caller+0x75/0x90 [ 294.798936] ? htab_map_alloc+0x29e/0x1190 [ 294.798952] bpf_map_area_alloc+0x6f/0x90 [ 294.798969] htab_map_alloc+0x29e/0x1190 [ 294.799001] htab_of_map_alloc+0x7d/0x100 [ 294.799020] ? htab_map_alloc+0x1190/0x1190 [ 294.810005] map_create+0x3bd/0x1110 [ 294.810025] ? find_held_lock+0x36/0x1c0 [ 294.810041] ? bpf_map_new_fd+0x70/0x70 [ 294.810060] ? __might_fault+0x12b/0x1e0 [ 294.810077] ? lock_downgrade+0x900/0x900 [ 294.810095] ? lock_release+0xa00/0xa00 [ 294.810110] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.810130] ? usercopy_warn+0x110/0x110 [ 294.810162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.818002] __x64_sys_bpf+0x303/0x520 [ 294.818020] ? bpf_prog_get+0x20/0x20 [ 294.818053] do_syscall_64+0x1b9/0x820 [ 294.818069] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.818087] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.818106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.828141] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.828165] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.828185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.828209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.828222] RIP: 0033:0x457569 [ 294.828239] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.828255] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.838807] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 294.838817] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 12:24:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x17, 0x0, 0x0) 12:24:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 12:24:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000001700)=0xc) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000001800)=[0x0, 0x0]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001840)=0x0) r6 = getuid() stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001940)={0x0, 0x0}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000004a40)=0x4, 0x2) fstat(r0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004380)={0x0}, &(0x7f00000043c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004400)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000004500)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001c00), &(0x7f0000001c40)=0xc) r13 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004540)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004580)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000004680)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b00)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000004ac0)="6e246e6f646576897070703000"}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004b40)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004c40)=0xe8) r18 = getgid() sendmmsg$unix(r1, &(0x7f0000004cc0)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000000c0)="f0ec06752af1d1a6f1b08118791c78f934ce963f92d650a8662850faca75f34d1aa22bcff06688ed555902a1554208a9d5fa80df0c19292e8918b9112a2dba5341f08fefd829a1b209e49f0732d1444071de", 0x52}, {&(0x7f0000000140)="eed95cef6f9420edf97712f6ad984afd10d9e0ee16638e8c513293d94ee11eabfe53c46cafe4558f76c0672d9081f3cce4c14dc08fc36b1f53c35077a5ea0428cf255c2f37b40a2722544dd4462e205a89976241a7fd32855d247bbce7a2b06e4f1a54ffa04cfc", 0x67}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="33f8edec1298935f670011b0bceaa4dde6b843bcac09bdd94e709a431127fd50e87131207eb151ad16af038bf30c53b2bac4437b7d5f12562e95e666ed04f631e106fe321a06b6df2581aa21971dccf990a33bc40da24db20fc8346439158c38ddbab4123f90d878faeb7c588dfa55b75614a75959e44279ed73427f49", 0x7d}, {&(0x7f0000001380)="ce8d6c31e019f5ae87404c42ebb208a2a8e5ead84486a2e39090df0bb44a0d05ed7e0bddce090391dca05d0b132f0ef4e19191124b3a4ed6a9418cd685c6959403c8584473ef047eb8b5b265e762aafc437e5db49792a2e0230b2b5d520e039fdf67abde741099bc54474a59a5e140ce02a9e5f992c5cb329239e3a2b8b656bc3db710055ac304e0bfb7e2eceafc367f25c28c5a81e892800198367f5448214b25f27862ac12385d0773de89ee51eb8f89", 0xb1}, {&(0x7f0000001440)="f12fdba40053546deaf4d8b2e9970c132766dafad2287a51c394b1e46f60e1c9c47a6cd8a4614d0403dc720c27708400c49aa8ae1392a5f7f32260deabbf6d4efa81e6654916f3ac4f81c46289d6da6242e05d4f88d9ad722198fc468cc03fc26488f5bb4076683183349c30", 0x6c}, {&(0x7f00000014c0)="bde8bbd2b50e307ae898af9d7b09537a6f4eebb2a7be4fba5af2ce5c70bd0ec4d499721aecb96ce7de54c27c33df203691b4540c2f18efdf6b16946eb1785509ecc89e6cd680627ad95491621a56c894e346d5bdd7b0ad83c00bd28e23e0af918144fe4b3a6ca1239709a3fc67dabcd7e5e7eda225a3d6d921cd583ed501ffbdc8a14b06a7db42cdb1f1c20a495a0f4b05642ff55ee8692d0f33f91f3359445ca5e0782d0c69ae2da738e895ac7a6655f7d9b6d45978f5575b365b11e4dc5d4cf36257d9d3d8b5110aefa7ba59c46a2c31098274f61fadd5b61ff072494fdce0ebff4b2ffc144da2e7b8a3337f27cd5157c154378be5", 0xf6}, {&(0x7f00000015c0)="7718c9de4c8bf25ac91b671a3deb97ff4f4f2d2dd45a83035f366de27d4395b4fd25e77a35be65b9ff2663ac923ba747554785b28464681eb8dcec075ffbeb30dd47744bc14b5216aba903936f6431ca1d1e371696622e4d736b82fd67606e2f2461974f9861a562ec4a669a770db997ef1ac76fb571c1dcbc93d5f57bf877a95e9e38003032004ad5eb6b5bdb553bc084775481535fb4555a442b", 0x9b}], 0x8, &(0x7f0000004dc0)=ANY=[@ANYBLOB="2000000000000000010000000200000027c0031b4235c0d034f281bd5dbb23019284d1348e458e75aed4362173d37eab25e79446741e256450a6dc4d26ec1281ba2e9f833ff7f9968b879e972803996357d3d96f8e7220d165833b0e0dc570788302", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00'], 0x88, 0x80}, {&(0x7f0000001b80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003fc0)=[{&(0x7f0000001c00)}, {&(0x7f0000001c40)}, {&(0x7f0000001c80)="03923aa30d5f3be68badc386e7f7c91aaa0f895ec7aafe152b74e10c6e0dc8d98d010b000eb69ea0644309d896b5feba4f56d68d1f17094521912de14807dec1dda1a212d1f44d9ef125ea3268ab654c8b847d79465b4fd77f8e6162d7cc", 0x5e}, {&(0x7f0000001d00)="182066c4b49fe11a834abbc15155f228cdd75d4b7df4c71aac8c2ce1f4b2210fb8b246e83496d4d59bf62af3cea57e97a8d16dc083edb6e6186169e55a895af57e8e3b71529c5d033a6aea7bae9b9542dc3664325919e29bb31c3ac026285d5a4eef9743310739a0c8e5970c6abc273ed9412f22294a48e759de7d10f275713dd0836b2bba2f92f5c7ff0cbaf65e410cd9968b21b70eae09ccc18d94de43971b1fbec98a65ca12fe042f4ad95a7949a8526f1a8f0dab6ae39ffa656ea09afc99d2dddbb688ff36a111e320a8e52592b8da8c", 0xd2}, {&(0x7f0000001e00)="d106bba12fa1d8e6042ce723b15a917f4d77279ed4c395462cc53b136008ccd11bb14b83609279bef3ebff0fe9e598fe373bdfde8a4c93b413e0269364727d6f5ea2758ae87c85df708c09bf3005aabfe976c4810dfb5b06554a71a81a58a8d57efd6e4da9b0c1e3e96dee4c1a934a7d16c2ac6111d91243f8c25b26b18f85463e07b8df90a6ab0026f017953bebba8d9d440c4ebbbc5a7f1b8a470c54de58592ff28247fba86afcde84491a18801e8dd5f6082da62f636e811944a15bee1ae697c6260721e04e12633a79b3424e59feabe68875dbf6f2", 0xd7}, {&(0x7f0000001f00)="77675d8ba2cea7aa8e6802660ee166f9457bcfb8ecaae79a9a3308b5f24a31f019b006be5474244f405570a323d80e21ccf708e1b5300d", 0x37}, {&(0x7f0000001f40)="2c1e3db4a85f81847c0ca22f8633f89cc10f4b6ba52f5876b66d6807b7a65e0e0a488942d89dfb886eb090971363b0c0ebf95a5c8ea1e2", 0x37}, {&(0x7f0000001f80)="291c10c2e67f627f318499c0e3e04d501db3050a07f263550339c732eb14bbeb4df6746f22587f125b262f74f26bc660ee995495510dc4e8a57e1ecbda7b8c75442528598b039a51f800f34fbdeef38768af54b7f1997a9db00da02b43fa523c12ef2e048e7971ef76107b752d1a88d8030b44bb0e6a968b89edc97798d3dccd41b6439b0090f29d8fe9a8a516b01875a772e0479aa5af9b1d1b454a8566ffa0bda907487274ff0ed0cb09a4d387abf2e237f3cff479b118a867bc6fc09c1b317883071a163f612b9a821a1afa63822a98c4de1791d3c4c1fd814bc47f404e06716c42853827e79b6ac4b54d82c790457a13729b46597478e8243f7270d863253990cdb47494e193df7fee467c6f2ff04afa22cc6415213a6535b081e4943adecf6b2a2da9dcb5f99c2fff03454b1c87bd68a8c0f383eaf8d04e112e84db515e5e26d53473dc5a589db95f445f3eee09e5a2c89ee3737f1f30688cfd0eedf49d4651261839fe95d6a3065711d35d53fb1291ec9c52382932d25f7e69c148aed25619cef01d1f43a8cf82af249d4962621380befb7b91369d9db6d9bf3b529bd30244b7ed9555610a1a39a58c56d94558faed9c898f6e1c6a0bae5052bfeb07ca7fb72dfbfc9aa91486298000111b8a361710492e22381faf3dfdbc93ce3db1dc2844aa668c6cc9b7a8edb9c32bddcbf0d41817d1ed3a8df57dd1bdfbc952807df062ae0dce4f0e66c21a1558227696b79a5edf0d0ae537056ceda1bb3d8550e52058c0340390345fef0e95320560a1dc0d559e23c96bec0065415f5779fcb9858f740f06cffdcb743ba9ec0cb6f28be2f5728a86f45fd5b4b42b5b4175f3b01726f665ae1d46f3b1a4ca2970dd5b3d11514b5c2e0a9d5498106a3943258f49a0f286010ff5d14b845901d470d587a89d6caaaf20fee207e926ed4d899f2abfa7883cd949ff15e22e9d910597ad2eda048356fca98710f21217bb64e987a816574728f22b02005e927a86237d6d47c40ad5c4733b659226330250a118d3eee9cced5bab4abf14d5af99e5a3d343e7b2594f098c440c3c08e7d2ed373e2a2b7d899adb618a45ed495ec086759182754462b5e331a2878067b7cd7e89d5f43ea70e3aa278f54c6b10d28786089c1ec0afe9a9fe6f5107c85132e03bd215725367124950dad64bb00657c51a8fe21f0a4133990210555f4375b3997a1c5ce51917c472c327ff1ad6f2b434a372d8b0a5e4fb1248c2c9c43e8159e6554b0d04173a0c7d7c79050ac096f1c8106d7f8f421706089a47f492e0c91cd36b2f584b26e607c342df23fc583aa4a38632acc78d34a44a50dabdbd7e3513972a8e1485a2cc2156a96e36a71ce796186fcd3846dba429e934c544632b3330f2f8efe5c51b1a1a24a4b4915ba93bf6b5b1743f623651fc4cab5726dbf6b1736573a4de26dfbab59d06f7219a6d462320787a8e186f8378773664f0f96157540c10d8347d8a3fc41ae2df2e3d3095eee14d7e9bf17f74bf1f83d09a2d6c1b4ecf441ad7d9d09cd82e5365fcbdd17ffa2099fefdf23e443b2b6021c810d8a68428831559349f883296470fdea56ea937cdaed33ed27bd0b22252d031e452db5ea2d55eb05d018a0453d27dc65af99e71677c87516ea5f447621b9f4271f7c0fb332867e77b48c7a67b17a016f25e5405c5bf78e54bd709db7a4dc8d382d20deed0ffc7a8a078a55a9baffff703b02fd9dec19a6b6fc2b41d6db2d779d3fcb5f70052b3f2c78f7b96b0ea43bb15afb08d32c669c46c6eb886c5d3c5b373639262e3033b136922ded93925f5563cbd254e046b0a520d01e33d0b9ab07e328d805ede856102372fc6cba1696267f157f4d2da308e457c419515888e1e45c16463973e82665289da4b611acbce8fae031cb53372185dbe8c29ece2ba987138c6b852e858d8282970c7de178ceb66b55937660a9e1498ce79023d15c8ea965f0c2576b65783c77d7a8a0b549b471d9df52463e5aa717d700dea3302c323848eac2b7ead3991f9a5d5b83d973df2ebf3774e8615c20a87f1bd7c61a88b6d00596711ee80e11b5dff629b7c9ea14de3aa7486419242d7784d8574b7a25d79c336850a162f29ce9f83a9cf319ae6b8e23a6aed7d086ed14235de968430f7ded69bdfcb83f8621fb4eb52757bc8a4f6c20bae0836e816b003a19dc7282913e3b2d471d1bc78937f8ff4d92239e77ad1579b192399ceabbea8dddb58b0ff67aec6932488e6cbca155461965cb9ba3d1f79eefc5a1948b3c1c989dad7980d71f2a98660768228d8513f3d7941c7f3d9db33de7fe9d9cb63e6f197ace93f157c7de4c70cae4377e3d391220d3d1d1ff5f628c7f4fb06c435f27447f139a98f2436758ab843f3a7ff814b4e0de6188767bfe1560ea64c18ab378437e910e49eb90503c399fc76092b1b3f2779ef13a9b86a126e029fdf9c5320eed9d014bece6fd3313585d32816f1f33479d889c8891f23d4bdd4f67193b67b3d4577f1324d3a2929d9fb6520a670554c8afd85119cd00dd134efe4914370486a8cf42ef0c991787894199dd835b0be517c46f762d8280be663044baf7e13ffee52a9f78febbff4a454511124eb819e86385971089a4222c47543b2bbad348e82c2191d228d7ff093dc815f3e1c83c72aeb67b310be02c72e66abae7bed332b5e4020b74d62a3580ec05fdec75f2d651e205e778aa978e36e3cbbde897306294fd3b722c5ab3e3ab78c2b8b3a882b877c4e925353755db4e579a66d7766c05d40d877fac8d220d9f8a70f618ea4f1d460f5ffc82871891fbb5dfa0006141dc3e9b82ab605db934fc91f93795637201b9d6863db695a168c702759e8b8d3876e6442640c8c8bada4b280e953a3aa25b02012fdb589703f251ca127817be3b1f7470a075e2e9d0ad1663846dd65735ece47cd2771cd91167422ed1b5a2f1b0c280cd6f0fd99bf51ec426c6d1b7ad94db2829822da9176a4a12e0f41cf1992bcc3d465cedea1ff7918bda340c7aa1dcce97ad53895e5c68341fc42e4b74854cd8768c8b38fdd24a1b49ca03868270f6cc22038635a9ec733fbf327e4f8ad731dd543f9790e77f1573e7693c4a2aa53895a8ae62f71dc02cbb828b4e744d4ed4af41156252b60c567063a45f029964fb7ff9ab91a3feda1ae54b87791e82cf28be26c0cde3fdea4ee6ee6c70b3e78eae7aee5f7f647d6fad2bc16be1b9a3d8b2a94628fa10d6b8d918c17286a4d90b755d3bc72287c94f44b8efac126356c4fe1a9e80a23e253427643e9b59d9e8aa6fef01ec1fa1a07e6071d3f69d8257ab9934ca717e2e63f3c6548a9a8c04371200e41a2e55fb987b9e325a91762dfae31548af7f98a5527cc9fcd7a2974627589e8094ed1eae07b720c4a4cad88d10a1b6536756f03285f773ffcd615dfbdecf8131e03afbf1568062f8818a0ece7e63a0e5b15c92ff3455dbbd84f453908e42e12a30d9d6a81a9b9131bb4ba457f4fdee20b1ca40351fe5cf35f95a913256158b475e0780a36e9628c966de5f46b16c97a1640bb7167a190f9bd14175658475958a903cb8468e856875daaa2a695b27e1337819d19bcf315348a49414955236813a6e3f5e2f583c8427605be96e2b4501596ab346cf14fb5cd43360922b5d95d24429fe8d24b54dd6231a0e4b6a4b3a769e8a94877fff69b35d13dd3e22e5d9ad431b50bf34b4156c9d56f03907917f98f728406f1ec44345e96a5926b0689d3e1749df5af14c567f1bb6ea2aaf04526812f14562f187d85437383928bed4569e9ad039de0d1ba76eb62e9f16f0fd9f8211ff4f3ad59d5b9f371f485bc67c033ec90f437a3c169eaffeae79114539aa0f2e608dc7b0c8122d2d1bff481f09d1cc75de05439e918819eefa27a605c7a2edf1d3d9308e75a8a172936a54d1b7b838b9a4ea415102fd58cede5f80f03cc652f9ca27cd9fb5a3f94fdf06f4450e83bd99e1db10ef6bfbfcd5d3e30861e436d5d24fc092043baeace7cbcf6e72c326c50b04fc5745992fe0985bbc7f24fa86540904e7d27b0ef424c48f9ac222e8e9b564fdfa0904efac8574c8f586d20b9872f37c156195ed8d2e2e0feda5120316dcc4ce5ac8386e090c35857ccc8d7566b7dca7ec0d803563baadb710c40349643179ff00e7036ff84a383dc5bb805a7d8b691c4e684200d1fbe940aa934e130e73ac30454ac3412b9df9c8957646a9815bde48a7f8dcb8d08b779135cf389dd83aa41b7f3bcf67f8e6c1f7e47c68c0c02533dcce47d9960577e740481374d548d4ce2ccfca970ee89132fca228d345589dfa1647d975b6deaaddb321e01f332df093c390dfe83b56d5b48b736ee942fcb46f54221020d52b21f62075255e776f8e33e9c063f0aa547803c62b061fef5ac82916bc12d16ea8cbb1d9c12203aa9000e435bd3e60f0777a0f6eba041d5ada1d2d8ecf95c83632f52a08dd8ae9088cd2d122ca34c9c261a49e89f94bd057146037781519dd23badd3fa627a82a2357aad1cb2510c2ce0b86d4bbf27b0f4dc002cc0e8680e66d23455e056bf8a16a07b0a6b9cb831c576d7f42e989b224cdac05abec9f640f169714f852ff45dee3d7a8a5ad9399352337fc4261bbd4c38b05eb3bf97e70b397cc202f0b209350bf5f6af57daacb5370f4bb967657491104575ad41d57a557e2ae1fb07b486894e67421ad3d9073f00456cd5956d46729b9425c51119b51a80a5883e1a3d39278bb0f728274a7b0b1b8ff0a1c1dc67aed015551520d1a5ee9995bc71b6e2b0cbdd828147d13580d15ceb767aa016ac15ed9fd89cb1c035ce404f9b7591652ff12a10863ff08afbf01b43308d90d114f6f2fee6f12a1b4de60786f59705de86c1ef71c2f6533df6ab30d144328fc155c92a07750afc99d902fb6f2d0166f7e2563e8f334f0c6078b7082e2980e438c4df449dcfb2cbc2b516099759b8f309e9bb54baa60c3f6b4d7c20812dc9a751f7cbb35abb44091bb13cea8edd5a36325cf2e37cc7fea3cd081e0bbe1f46de4c6b0fdce4ac87743d5ecdc357cee0c4119a55c2f88039b29582af6838097e845e19f022632526a45266d3cd09fce6e8f160d04f1f3f667d04d5ac990e12a7bd6104c5338e0434f50cc8156b720d64a64313b4035d6238e21d7b16dd23a8eb3bd96fe421666122ab4eccdb3f479952adbf17a048cca815d5bebeb884adaae42dc754c320f5577c82128c0843cd629394e327fb6deae1248e315b578c4f0732f9b54085b69bf45361146a0c95bd8c62cfa1e28f722a15b966d07fe909730f23ec0638b703e0620b3c05bcfc1b3881ca0ebde7556711cbe2df6f0e513d24e0425787c6ee2d9abd1e8e910820b7ce55272c21d49a002e08d7f65a27dd1da2fb281a5de250cfe3a988e60cdb6ff04014ff9d9dd681af58ef18242c6e23449b4cfc785f34e63082533e03a8d67418d9878fae79bc082e9cee8000dee6b9074ccd2302a63e9980aed2fefe65100f285c11025ac69710bb293e5b0ea2c2ff24b72c74ca1bd424fa790aa40e5d73f940be1fafa0c163be4c648035fcb38ecd20ac1c2ebff431b3356e91ba2e8bd83e5e0cecc42266efe074171e7fc7fe1da897346f236ffc92f711c30001f63320f5ed49c0bd14a9811d0738e3c589e1e6c6f80c372d797cb7cf2f4bc6c6799c9ec038a5e8a0891cf862c78a20539638f6d83f4cc5129b22b4d9544e02f5fe2c5615d833bbe620de49b560f091115c843c39f1fc00e4e881eafea176380471d05d234c4aa46120fcb421e00233b5e95ec3e49e1a", 0x1000}, {&(0x7f0000002f80)="617c1b1f7f0abadad94378bb9e533f06611b88a0d68f93a95025f7f545a32fe1a6446f62e9e1f79cb11bd047e4a703555f99211647ac76cc", 0x38}, {&(0x7f0000002fc0)="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", 0x1000}], 0xa, 0x0, 0x0, 0x20040840}, {&(0x7f0000004080)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004100)="ec58659d475fa3e8933811e10c6d02d41248baf38b095a8f97bab9c06a024b21753bea170f65d4316017767afb668efc03808b8963d6b580d8eb5f6d00adc9458efaf4edff10fca6bcff567db66e82620284bfa7c2c7ecbd21b81facaccfc64e9cf872c4bcbc05001e5b7aa21257e3d2b050748d9aaa703ccc1afb6db2c1a0d7024a0840625c2a398360286e9e2c2878b9aef7ca682c9905", 0x98}, {&(0x7f00000041c0)="286c49797434666cd8dacb6457cdff46fbc71a44dc814635fd635b549ecc97b490339156ea80824e28da1f885324e42c08ee38", 0x33}, {&(0x7f0000004200)="4d340e4df6a3a6cd2bea7a83691802675e062ce88728bea61856257d02a1fc1cffd8f6b8997e8e939820fa06ce3aaf6207f815b7fd6caf4df69d10b3ab9f78d77bebbb2a045128444e1a59175bb804e7fc6fa0aabdc64233bcc343706915b99e75ac672068d22fd9f3aa73f0e82b2dcc03e068de24261710a512e09183328042d3f0160da5bb0b8a63e9e6ed63aea84f74fd8eb343ae83bae5ecf2c21ff4b56833162defd0401cde5cc8b2219684db65a432cd2c0c6326167c9f299ed2481fb4149e18a6b5587f2ac7aeb5691554835e249df2284b7476cb029ff77b8a2c3eebaed5b150a8fb3ea59e45561376", 0xed}, {&(0x7f0000004300)="5d6142dfd565cd0725c777f9a4550828", 0x10}], 0x4, &(0x7f0000004700)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0xb8, 0x40000}, {&(0x7f00000047c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000004a80)=[{&(0x7f0000004840)="6817d61aa9029d29a25c147e81456423eb7857081ecb5fba1408962eebae4bc641d9c9375d72916e56a81a9a204158adf749b07785ebfcec4f1132e803937a39997c585230d7bff7858f01f9ec1bead676f70d32bfbbba4c1d80053e7a77503895865a25344233adadc9fce5d03eefc5eaeb74c1cd211ff60b8524a28b0878bcb6296bcb50be7fca78af954fc3af835ba126b9c9f9350b9651716b7bf384c328b4a10bcf6414d23ed4555c09e6e1f4c11dea64064eb7fc68596ee51bd91b6bc1afd621c4902961393355f2e7aeae266139edf399c464", 0xd6}, {&(0x7f0000004940)="d9d19d5ef45c500cf41fbd60aa13465e50060100b716c00bc6dfdf9dba6a8e65f3db94dec8c7ab45dd5f8b3c5a0cbacbf99ee024567a2309e85aaa0abf0f43e4aee678676733c8d193c7cc05ad7fa36997c27b1bdd716bbbf741fc4d8a6162ae72877662d362ee31d2ae55aa531709507628ae882c314c81b8306cf0497e745004bac9a8a284002bfa5531d0b2e406c1934c08de72f2db64d47109fae593dca9eb6f9b2b265265c511fcd2220f00f45cd88d4a6a03011c12bf510328ec19d5481173439c6efc", 0xc6}, {&(0x7f0000004a40)}], 0x3, &(0x7f0000004c80)=[@cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x20, 0x8010}], 0x4, 0x4880) 12:24:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e23, @rand_addr=0x3}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0x2, 0x1000004e23, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) 12:24:29 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x100000000000003, &(0x7f0000000040), 0x106, 0x100b}}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:29 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460600e21b1a3ace3e3a9e790000000000000076ad518be43a03000000000000000086643cb7d46e4e6bff681a558856d473d45a4f8819d62949876e2b60e3dc13b696fe66eb5a415967c12afdff5fb31e9959a1102e8c68c516daadd9697968413b08ebca216b34bf524a3e81425c7d8c9850615e386848b0716436de813c7b45355a7d96c08b3fd36d1f8566f8bd556158746b09e8"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 294.838826] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 294.838836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 294.838845] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:29 executing program 4 (fault-call:2 fault-nth:30): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf20a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:30 executing program 3: 12:24:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x480, 0x0, 0x0) 12:24:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth1_to_bridge\x00') 12:24:30 executing program 3: [ 295.321194] FAULT_INJECTION: forcing a failure. [ 295.321194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.355786] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 295.363129] CPU: 1 PID: 11043 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 295.370616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.377537] IPVS: set_ctl: invalid protocol: 40200 255.255.255.255:39035 [ 295.379984] Call Trace: [ 295.380016] dump_stack+0x244/0x39d [ 295.380042] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.398310] ? find_held_lock+0x36/0x1c0 [ 295.398351] should_fail.cold.4+0xa/0x17 [ 295.398372] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.398389] ? zap_class+0x640/0x640 [ 295.398409] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 295.406846] IPVS: set_ctl: invalid protocol: 40200 255.255.255.255:39163 [ 295.411621] ? kasan_check_read+0x11/0x20 [ 295.411641] ? rcu_softirq_qs+0x20/0x20 [ 295.411658] ? unwind_dump+0x190/0x190 [ 295.411681] ? find_held_lock+0x36/0x1c0 [ 295.411712] ? check_preemption_disabled+0x48/0x280 [ 295.420357] ? lock_release+0xa00/0xa00 [ 295.420375] ? perf_trace_sched_process_exec+0x860/0x860 [ 295.420394] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 295.420414] ? rcu_pm_notify+0xc0/0xc0 [ 295.431411] ? __might_sleep+0x95/0x190 12:24:30 executing program 3: [ 295.431451] __alloc_pages_nodemask+0x366/0xea0 [ 295.431467] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.431487] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 295.443394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.443416] ? check_preemption_disabled+0x48/0x280 [ 295.443443] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 295.443480] ? kasan_unpoison_shadow+0x35/0x50 [ 295.471263] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 295.471289] alloc_pages_current+0x173/0x350 [ 295.471312] __vmalloc_node_range+0x498/0x750 12:24:30 executing program 3: [ 295.471338] ? htab_map_alloc+0x29e/0x1190 [ 295.481359] __vmalloc_node_flags_caller+0x75/0x90 [ 295.481379] ? htab_map_alloc+0x29e/0x1190 [ 295.481397] bpf_map_area_alloc+0x6f/0x90 [ 295.481416] htab_map_alloc+0x29e/0x1190 [ 295.481447] htab_of_map_alloc+0x7d/0x100 [ 295.496988] ? htab_map_alloc+0x1190/0x1190 [ 295.497005] map_create+0x3bd/0x1110 [ 295.497023] ? find_held_lock+0x36/0x1c0 [ 295.497040] ? bpf_map_new_fd+0x70/0x70 [ 295.517077] ? __might_fault+0x12b/0x1e0 [ 295.517102] ? lock_downgrade+0x900/0x900 [ 295.543163] ? lock_release+0xa00/0xa00 [ 295.543181] ? perf_trace_sched_process_exec+0x860/0x860 [ 295.543202] ? usercopy_warn+0x110/0x110 [ 295.543234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.551705] __x64_sys_bpf+0x303/0x520 [ 295.551723] ? bpf_prog_get+0x20/0x20 [ 295.551770] do_syscall_64+0x1b9/0x820 [ 295.551787] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.551807] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.559571] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:24:30 executing program 3: [ 295.567585] ? trace_hardirqs_on_caller+0x310/0x310 [ 295.567603] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.567620] ? prepare_exit_to_usermode+0x291/0x3b0 [ 295.567646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.581211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.581229] RIP: 0033:0x457569 [ 295.581263] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.581277] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f00000300030000000000000000003800000000000000000000000100200001d169c0e032bd31a02e0f9f37485ee2bb8a0f928fd326b75c0e3fb2718b6e7c4ed41438d501cd17258cf5526f96e58c2fda7f6a5e2b7318f70662932d9f4389000000000000000000000000000000000000000000"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 295.594756] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 295.594767] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 295.594776] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 295.594787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 295.594796] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000030000000001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000100)={0x9, {{0xa, 0x4e20, 0xc0000000, @ipv4={[], [], @remote}, 0xb1d}}, {{0xa, 0x4e23, 0x100000001, @mcast1, 0x400000}}}, 0x108) 12:24:30 executing program 4 (fault-call:2 fault-nth:31): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:30 executing program 3: 12:24:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x6000000, 0x0) 12:24:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r1, 0x1, 0x8, 0x1f}, &(0x7f0000000040)=0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x40) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0x4, 0x4) 12:24:30 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f4500000000000000000600fa000000000100000000000000000000000000aea0889a0fae30079bce149cb1d7e01ebacd4704ca8734210501f2d86537316ea6c28cd2b2cb269b4c9dbf5c042bbbc44ca11b548c5942d6639e4ef1c7f9cf673507f48c059fa0c83e9c2c38f11dcd781034c0c51443ec14a8cef078c3529149af2e22f32a3defadc3e930f3090c0a67d68f81439dd889b2612f022498c2fa462e9856adb725710000000000003f4f901c844f423ec7d7d59dffc6de240e3feb31f74ab6b2f0ec96b9c973349aa5f7425da469cbc11286784bd648cbe716a47aca214b13c9f045e3458ba96f79326c8353096c9d"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x110b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:30 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) r1 = getpgrp(0xffffffffffffffff) stat(0x0, 0x0) setpgid(r1, 0x0) [ 295.916145] FAULT_INJECTION: forcing a failure. [ 295.916145] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.942580] CPU: 1 PID: 11088 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 295.950007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.959380] Call Trace: [ 295.961996] dump_stack+0x244/0x39d [ 295.965643] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.970848] ? find_held_lock+0x36/0x1c0 [ 295.974928] should_fail.cold.4+0xa/0x17 [ 295.979004] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.984120] ? zap_class+0x640/0x640 [ 295.987841] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 295.992776] ? kasan_check_read+0x11/0x20 [ 295.996930] ? rcu_softirq_qs+0x20/0x20 [ 296.000913] ? unwind_dump+0x190/0x190 [ 296.004814] ? find_held_lock+0x36/0x1c0 [ 296.008902] ? check_preemption_disabled+0x48/0x280 [ 296.013928] ? lock_release+0xa00/0xa00 [ 296.017908] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.023367] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.028913] ? rcu_pm_notify+0xc0/0xc0 [ 296.032817] ? __might_sleep+0x95/0x190 [ 296.036803] __alloc_pages_nodemask+0x366/0xea0 [ 296.041476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.046857] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 296.051881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.057428] ? check_preemption_disabled+0x48/0x280 [ 296.062459] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.068026] ? kasan_unpoison_shadow+0x35/0x50 [ 296.072612] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 296.078158] alloc_pages_current+0x173/0x350 [ 296.082578] __vmalloc_node_range+0x498/0x750 [ 296.087094] ? htab_map_alloc+0x29e/0x1190 [ 296.091865] __vmalloc_node_flags_caller+0x75/0x90 [ 296.096804] ? htab_map_alloc+0x29e/0x1190 [ 296.101045] bpf_map_area_alloc+0x6f/0x90 [ 296.105198] htab_map_alloc+0x29e/0x1190 [ 296.109286] htab_of_map_alloc+0x7d/0x100 [ 296.113437] ? htab_map_alloc+0x1190/0x1190 [ 296.117768] map_create+0x3bd/0x1110 [ 296.121487] ? find_held_lock+0x36/0x1c0 [ 296.125549] ? bpf_map_new_fd+0x70/0x70 [ 296.129529] ? __might_fault+0x12b/0x1e0 [ 296.133593] ? lock_downgrade+0x900/0x900 [ 296.137757] ? lock_release+0xa00/0xa00 [ 296.141746] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.147208] ? usercopy_warn+0x110/0x110 [ 296.151296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.156846] __x64_sys_bpf+0x303/0x520 [ 296.160746] ? bpf_prog_get+0x20/0x20 [ 296.164575] do_syscall_64+0x1b9/0x820 [ 296.168467] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.173856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.178794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.183644] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.188664] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.193685] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.198715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.203573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.208772] RIP: 0033:0x457569 [ 296.211977] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.230880] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 296.238591] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 296.245861] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 296.253129] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 296.260395] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x800000032, &(0x7f0000003000)=0x1000000, 0x4) [ 296.267680] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x44, 0x0) 12:24:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x100000005, 0x84) sendto$inet6(r0, &(0x7f0000000300)="248c8009cdb293824b369df67d05cbd730861d83ecfb7b5facd73c52f73072d565f5d3f2251aeb148fbd4da2df848a1f4403dd82549299c409e88b429000f3b8017694b7057573ff79bdc4e4dff6895a2b7236e770f7dc74c60395540021638b951040e49e442f3fb4545df2f5ea208aa5b968de904d19e87b1d58147b7eaf6e0714a2456b28f6fcd1f2d0f2bf3e2995203c3df1812b27f1e5fce26bc53cdf56e2043c3364", 0xa5, 0x4044, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x800, 0x7}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400)={r1, 0x1, 0xff, 0x80000000}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x7ff, 0x8afd}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0xb8599e18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r3, 0x7f, 0x3}, 0xc) [ 296.344897] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000100)={{0x3c, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e21, 0x3, 'rr\x00', 0xd, 0x1f, 0x7}, {@remote, 0x4e21, 0x10004, 0x6, 0xd5a, 0x5}}, 0x44) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x80, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="69b7d5a48192c17e4beaf2965e896863c6ba4bd7ed56b410ca032e0e9a1f645d708773364df84c72b47fe182dc1e4beb1cd4ac2ad6a16e3daf15589fc9688b64dcf4e215cb05c85a9e9fd4fcec7d2768f9bea3adb2ff3dfaa7d3d3f05e21ce074370bc8e2fbed4ac3052ef1e7f000220aead27479abcc9e59b2235a14805de5dd6eade0ededa62da1069e4c9c7ee7112b9", 0x91, 0x70f}], 0x40008, &(0x7f0000000540)={[], [{@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}, {@fsname={'fsname', 0x3d, 'vmnet1wlan0#'}}, {@obj_user={'obj_user', 0x3d, 'ppp0]cpuset'}}, {@fowner_gt={'fowner>', r1}}, {@fowner_gt={'fowner>', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'rr\x00'}}, {@appraise_type='appraise_type=imasig'}]}) 12:24:31 executing program 4 (fault-call:2 fault-nth:32): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xcd0a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0xf0ffffff7f0000, 0x0) 12:24:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x40, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x7a, "2d9a265921c0c754fff470c4eb58cc44eb7e2d8b5625df5941ae159b2e20d635bb617c0de24fab7a35930d6fb99b5bfdddcb13870e5612008e3e04a7f5d3f82e2296ad3fe31165b7fd99da02f96f29e0ef2260c332a4d337d23e50a22dcef384cb2e8490d4aab19c626040bfa2be543f6c7a5cd3853c4cc9e357"}, &(0x7f00000000c0)=0x82) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x4, 0x6, 0x80000000, 0xd2, 0xffff}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r4 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101000) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f00000001c0)={0x0, 0x0, 0x5, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x8}) 12:24:31 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x0, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) [ 296.609496] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000000000000300d00300205734c4a618be4b048077eb000000000000070000000000000000000095662c7aaff7e62d0000200000"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x6f760b41039042ab) getsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f0000000040)={@loopback, @local, @remote}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 296.713551] FAULT_INJECTION: forcing a failure. [ 296.713551] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 296.802983] CPU: 1 PID: 11159 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 296.810394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.819766] Call Trace: [ 296.822361] dump_stack+0x244/0x39d [ 296.825994] ? dump_stack_print_info.cold.1+0x20/0x20 [ 296.831192] ? find_held_lock+0x36/0x1c0 [ 296.835267] should_fail.cold.4+0xa/0x17 [ 296.839341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.844447] ? zap_class+0x640/0x640 [ 296.848182] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 296.853114] ? kasan_check_read+0x11/0x20 [ 296.857267] ? rcu_softirq_qs+0x20/0x20 [ 296.861255] ? unwind_dump+0x190/0x190 [ 296.865150] ? find_held_lock+0x36/0x1c0 [ 296.869289] ? synaptics_init_ps2+0xdc0/0x1c30 [ 296.873887] ? check_preemption_disabled+0x48/0x280 [ 296.878908] ? lock_release+0xa00/0xa00 [ 296.882890] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.888345] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.893889] ? rcu_pm_notify+0xc0/0xc0 [ 296.897784] ? __might_sleep+0x95/0x190 [ 296.901777] __alloc_pages_nodemask+0x366/0xea0 [ 296.906450] ? retint_kernel+0x2d/0x2d [ 296.910349] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 296.915373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.920917] ? check_preemption_disabled+0x48/0x280 [ 296.925944] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 296.930712] ? synaptics_init_ps2+0xf09/0x1c30 [ 296.935321] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 296.940869] alloc_pages_current+0x173/0x350 [ 296.945286] __vmalloc_node_range+0x498/0x750 [ 296.949797] ? htab_map_alloc+0x29e/0x1190 [ 296.954034] __vmalloc_node_flags_caller+0x75/0x90 [ 296.959116] ? htab_map_alloc+0x29e/0x1190 [ 296.963359] bpf_map_area_alloc+0x6f/0x90 [ 296.967511] htab_map_alloc+0x29e/0x1190 [ 296.971597] htab_of_map_alloc+0x7d/0x100 [ 296.975763] ? htab_map_alloc+0x1190/0x1190 [ 296.980085] map_create+0x3bd/0x1110 [ 296.983801] ? find_held_lock+0x36/0x1c0 [ 296.987870] ? bpf_map_new_fd+0x70/0x70 [ 296.991849] ? __might_fault+0x12b/0x1e0 [ 296.995911] ? lock_downgrade+0x900/0x900 [ 297.000070] ? lock_release+0xa00/0xa00 [ 297.004046] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.009503] ? usercopy_warn+0x110/0x110 [ 297.013606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.019154] __x64_sys_bpf+0x303/0x520 [ 297.023047] ? bpf_prog_get+0x20/0x20 [ 297.026870] do_syscall_64+0x1b9/0x820 [ 297.030772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.036168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.041101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.045951] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.050983] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.056005] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.061444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.066295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.071501] RIP: 0033:0x457569 [ 297.074710] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.093615] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:31 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f450d2ab2adbabc661489291671c9bacd3c4c46000000000000000000000000030003000000000400000000e900000000000000000000000000200001"], 0x2d) signalfd(r0, &(0x7f0000000080)={0x100000000}, 0x8) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x100000000000000, 0x0) [ 297.101324] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 297.108596] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 297.115864] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 297.123129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 297.130402] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r2, 0x9) splice(r1, 0x0, r2, 0x0, 0x8ec0, 0x0) close(r2) close(r5) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e21, @multicast2}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xd90a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000000004, 0x400031, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)) fcntl$lock(r1, 0x1000000000000024, &(0x7f0000000100)) 12:24:32 executing program 4 (fault-call:2 fault-nth:33): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:32 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) tee(r0, r0, 0x2, 0x7) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 297.290817] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000400)=0x42, 0xff63) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000080)={{r2, r3/1000+30000}, 0x4, 0xa00}, 0x18) io_setup(0x7fff, &(0x7f0000000100)=0x0) io_pgetevents(r4, 0x2, 0x7, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2}, 0x8}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x3d1) 12:24:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x1000000, 0x0) 12:24:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000140)) [ 297.414584] FAULT_INJECTION: forcing a failure. [ 297.414584] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 297.467402] CPU: 1 PID: 11205 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 297.474797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.484157] Call Trace: [ 297.486763] dump_stack+0x244/0x39d [ 297.490422] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.495636] ? find_held_lock+0x36/0x1c0 [ 297.499727] should_fail.cold.4+0xa/0x17 [ 297.503808] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.508919] ? zap_class+0x640/0x640 [ 297.512634] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 297.517565] ? kasan_check_read+0x11/0x20 [ 297.521714] ? rcu_softirq_qs+0x20/0x20 [ 297.525700] ? unwind_dump+0x190/0x190 [ 297.529597] ? find_held_lock+0x36/0x1c0 [ 297.533674] ? check_preemption_disabled+0x48/0x280 [ 297.538696] ? lock_release+0xa00/0xa00 [ 297.542678] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.548134] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 297.553676] ? rcu_pm_notify+0xc0/0xc0 [ 297.557570] ? __might_sleep+0x95/0x190 [ 297.561551] __alloc_pages_nodemask+0x366/0xea0 [ 297.566218] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.571593] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 297.576617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.582164] ? check_preemption_disabled+0x48/0x280 [ 297.587194] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 297.592750] ? ring_buffer_entries_cpu+0x220/0x300 [ 297.597697] ? kasan_unpoison_shadow+0x35/0x50 [ 297.602284] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 297.607829] alloc_pages_current+0x173/0x350 [ 297.612254] __vmalloc_node_range+0x498/0x750 [ 297.616778] ? htab_map_alloc+0x29e/0x1190 [ 297.621020] __vmalloc_node_flags_caller+0x75/0x90 [ 297.625954] ? htab_map_alloc+0x29e/0x1190 [ 297.630196] bpf_map_area_alloc+0x6f/0x90 [ 297.634362] htab_map_alloc+0x29e/0x1190 [ 297.638468] htab_of_map_alloc+0x7d/0x100 [ 297.642618] ? htab_map_alloc+0x1190/0x1190 [ 297.646939] map_create+0x3bd/0x1110 [ 297.650656] ? find_held_lock+0x36/0x1c0 [ 297.654720] ? bpf_map_new_fd+0x70/0x70 [ 297.658710] ? __might_fault+0x12b/0x1e0 [ 297.662785] ? lock_downgrade+0x900/0x900 [ 297.666940] ? lock_release+0xa00/0xa00 [ 297.670933] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.676402] ? usercopy_warn+0x110/0x110 [ 297.680488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.686041] __x64_sys_bpf+0x303/0x520 [ 297.689932] ? bpf_prog_get+0x20/0x20 [ 297.693766] do_syscall_64+0x1b9/0x820 [ 297.697658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.703028] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.707963] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.712815] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.717839] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.722861] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.727885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.732746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.737942] RIP: 0033:0x457569 [ 297.741141] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.760054] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc90a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) [ 297.767773] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 297.775040] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 297.782324] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 297.789593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 297.796863] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:32 executing program 4 (fault-call:2 fault-nth:34): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x7ffffffff000, 0x0) [ 297.855916] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:32 executing program 1: clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "91bd3ab98678e2541f85a7893b25d366"}, 0x11, 0x0) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c41000000000000000000000000030003000000000000000000380000000000000000000000000020000161448d15028a766ac5d542ed78c526e32827c2662fedf559ae7d17cad09bafc67001898f4c8efa00ad24e744a359eb359498"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x2}}, 0x18) 12:24:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000600)=ANY=[@ANYPTR], 0x8) ppoll(&(0x7f00000000c0)=[{r1}, {r0}, {r0}], 0x3, 0x0, &(0x7f0000000200)={0xa662}, 0x8) 12:24:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10ade, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0xa, 0x100) r1 = memfd_create(&(0x7f0000000000)='/\x00', 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000040)={0x2, 0xfffffffffffffeff, 0x5cc, 0x1, 0x7}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x15000000000000, 0x0) 12:24:32 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) write$binfmt_elf32(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x40000000, 0x8, 0x9, 0x100000001, 0x4, 0x3, 0x6, 0x100000001, 0xff, 0x38, 0x346, 0x1, 0x2, 0x20, 0x2, 0x0, 0x81, 0x1cf}, [{0x70000005, 0x9, 0x5, 0x5, 0x8, 0xffffffffffffffff, 0x8, 0x8}, {0x7, 0x6, 0x14c24a90, 0x1c0000, 0x1, 0x7fff, 0xaf7, 0x8000}], "1e9c39286ae864de3a45d54b209f8182faec4ff18361a1e1853115c361677d913db88b64bf258de04d77bed75ba04cc511fe1bb55a0e0ad6e516453b032e1ab366b45eb9363713a96109eb4513f234e689d8ac07f11bb470f4a530e43e40", [[], [], [], [], [], [], [], [], []]}, 0x9d6) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') eventfd2(0x1f, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x0, @mcast2, 0x592}, r1}}, 0x38) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x150000, 0x0) [ 298.122201] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 298.146113] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET) 12:24:33 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xcb, 0x63, &(0x7f0000000100)="495c60884c19d5c7b4d1212acae2c1e103bd84572b98254c41a036f144a913812acc842fe0f5b6810ed735c9abb87a5997b1bfe20881d691fe73f0dceeed5fc17384ab577bb384289eabc89383e78fa5ce40807858c459102516ee6ccff347434a8449823216f2081ed5bd1b050ee9b36016c1b3e101089afeef791f51b47cdadf602963d0ce00c2ab0ba73f4302cf85fbcfcdc63ce4ba84c70f2c41ec110e098c21a0b6b2f5027330a342b34358b9e35bfbed0562d67aa78beb00d266ed52bae39a81388eacd3dd80df7f", &(0x7f0000000200)=""/99, 0x9}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000680)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0xc) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x4, @remote, 0x2}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="08e52380b65267d5721919a10e98946c74a1c61778808fcb639c030e86042a67df92ab490396d2e49bd2b39b7af45d232ab57273bc9b826fc1bbc71463147115aeaf7b8e6eb79958c19e0d33a4fb3b9d19140b33cad6130cd66d723dcccb75262cc274f557ddc1babb897ac421390bbdce85b55921def9d83bbea9f4bcb5fd8f51630e08f0ec72ac2a55e411d34509c3b1bfc7d861c57540bb9150f74141830ef10fdff42283c386ede80fec5b7d2a71bb2c9e2f86db40dcf7163ed8d399ecf2", 0xc0}, {&(0x7f00000003c0)="4e407bdbad401dc29641c2508376fc2a85d84fc3e94ff49b68cb96fcf014506ebd970aa5c189691200c504035287b704710bad8ac6420305dcec729e8918db6a89d0860aaab4413b844cac72e0b23cccad59625a58f127890d463e7cd3ade77c70c7c772b1ec94bd5a803dcad1c309131351ea9e7a38310d7085611510d679acac2e01178463c0373e36f43a099c91ade211e2437f9621a8caf5bfe8e713d3977de88c9649d720c9d2c518e44aede193962022c0839bbe47fe1c4dd2300a1025ec4a65880d5a658a2d239daab3115f3a43", 0xd1}, {&(0x7f00000004c0)="ec05c206a4f4dcc6e055af32b7b550b3d5012f16fb4fbcf507368fbaa887a66b532cbb288f64b3418482e0438d9c55cf8720429a885a05afdefa3d898e69458ac461a134844922c4581e74eca4a4290440c42e55c5cb9b65fcb2bf5c15fddb0c74478439e0c601e9bed74ec731b2f8bf99d0ce25a6929e67a0fd487fac3c13dec38e103c2889af83ec873e27cc80c050ad13d4c10a46d5eb50b02dc6fbb2c92a4ee49fe2", 0xa4}, {&(0x7f0000000580)="2436102316a6e9bd1d97a92e063ad30b4bd7c8f894d4fda27e44168603f96a03b442efbf12643579b8b698afc2b762892b5c89d9ea10fd7757fae5db2e50d6ef80c4dd992b972df3065b554e5ac2f27970fde67c83e188ccd549c8227aee4295b258638deea8fb6cf4658a13f5ab9f2f79e0f460e2fd8e", 0x77}], 0x5, &(0x7f0000000700)=[@sndinfo={0x20, 0x84, 0x2, {0x400, 0x2, 0x7, 0xfff, r1}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3ff}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x8001}}], 0x70}, 0x94) write$binfmt_elf32(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000000000000000000020000170945df173a4eb767e4d0d"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x4400, 0x0) [ 298.210974] FAULT_INJECTION: forcing a failure. [ 298.210974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.271876] CPU: 0 PID: 11262 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 298.279300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.288670] Call Trace: [ 298.291276] dump_stack+0x244/0x39d [ 298.294931] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.300152] ? find_held_lock+0x36/0x1c0 [ 298.304234] should_fail.cold.4+0xa/0x17 [ 298.308308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.308327] ? zap_class+0x640/0x640 [ 298.308342] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 298.308362] ? kasan_check_read+0x11/0x20 [ 298.326253] ? rcu_softirq_qs+0x20/0x20 [ 298.330246] ? unwind_dump+0x190/0x190 [ 298.334157] ? find_held_lock+0x36/0x1c0 [ 298.338252] ? check_preemption_disabled+0x48/0x280 [ 298.343292] ? lock_release+0xa00/0xa00 [ 298.347283] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.352766] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.358320] ? rcu_pm_notify+0xc0/0xc0 [ 298.362227] ? __might_sleep+0x95/0x190 [ 298.366219] __alloc_pages_nodemask+0x366/0xea0 [ 298.370900] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.376286] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 298.381319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.386870] ? check_preemption_disabled+0x48/0x280 [ 298.391912] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.397489] ? kasan_unpoison_shadow+0x35/0x50 [ 298.402094] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.407653] alloc_pages_current+0x173/0x350 [ 298.412080] __vmalloc_node_range+0x498/0x750 [ 298.416602] ? htab_map_alloc+0x29e/0x1190 [ 298.420848] __vmalloc_node_flags_caller+0x75/0x90 [ 298.425796] ? htab_map_alloc+0x29e/0x1190 [ 298.430045] bpf_map_area_alloc+0x6f/0x90 [ 298.434208] htab_map_alloc+0x29e/0x1190 [ 298.438290] htab_of_map_alloc+0x7d/0x100 [ 298.438307] ? htab_map_alloc+0x1190/0x1190 [ 298.438325] map_create+0x3bd/0x1110 [ 298.450506] ? find_held_lock+0x36/0x1c0 [ 298.454586] ? bpf_map_new_fd+0x70/0x70 [ 298.458580] ? __might_fault+0x12b/0x1e0 [ 298.462657] ? lock_downgrade+0x900/0x900 [ 298.466823] ? lock_release+0xa00/0xa00 [ 298.470819] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.476288] ? usercopy_warn+0x110/0x110 [ 298.480383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.485938] __x64_sys_bpf+0x303/0x520 [ 298.489839] ? bpf_prog_get+0x20/0x20 [ 298.493672] do_syscall_64+0x1b9/0x820 [ 298.497569] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.502947] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.507888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.512777] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.517814] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:24:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x4400000000000000, 0x0) [ 298.522860] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.527898] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.532779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.537973] RIP: 0033:0x457569 [ 298.541196] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.560104] RSP: 002b:00007f80a0acec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:33 executing program 4 (fault-call:2 fault-nth:35): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:33 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x4000) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x7ff) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030500000000000000003800000000000000000000000000200001"], 0x2d) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x6def, 0x2}, &(0x7f0000000100)=0x90) sysinfo(&(0x7f0000000300)=""/92) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0xfc}, 0x8) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000180)=0x7) syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x1, 0x200000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) prctl$PR_GET_FP_MODE(0x2e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 298.567806] RAX: ffffffffffffffda RBX: 00007f80a0acec90 RCX: 0000000000457569 [ 298.575088] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 298.582379] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 298.589673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0acf6d4 [ 298.596957] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000004 [ 298.719767] FAULT_INJECTION: forcing a failure. [ 298.719767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.753104] CPU: 1 PID: 11295 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 298.760564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.769928] Call Trace: [ 298.769957] dump_stack+0x244/0x39d [ 298.769982] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.770002] ? find_held_lock+0x36/0x1c0 [ 298.770036] should_fail.cold.4+0xa/0x17 [ 298.781440] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.781459] ? zap_class+0x640/0x640 [ 298.781473] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 298.781489] ? kasan_check_read+0x11/0x20 [ 298.781507] ? rcu_softirq_qs+0x20/0x20 [ 298.781525] ? unwind_dump+0x190/0x190 [ 298.781546] ? find_held_lock+0x36/0x1c0 [ 298.781577] ? check_preemption_disabled+0x48/0x280 [ 298.781596] ? lock_release+0xa00/0xa00 [ 298.781615] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.833856] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.839411] ? rcu_pm_notify+0xc0/0xc0 [ 298.843311] ? __might_sleep+0x95/0x190 [ 298.847293] __alloc_pages_nodemask+0x366/0xea0 [ 298.851971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.857360] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 298.862392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.867943] ? check_preemption_disabled+0x48/0x280 [ 298.872976] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.878546] ? kasan_unpoison_shadow+0x35/0x50 [ 298.883143] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.888696] alloc_pages_current+0x173/0x350 [ 298.893121] __vmalloc_node_range+0x498/0x750 [ 298.897633] ? htab_map_alloc+0x29e/0x1190 [ 298.901874] __vmalloc_node_flags_caller+0x75/0x90 [ 298.906813] ? htab_map_alloc+0x29e/0x1190 [ 298.911058] bpf_map_area_alloc+0x6f/0x90 [ 298.915214] htab_map_alloc+0x29e/0x1190 [ 298.919309] htab_of_map_alloc+0x7d/0x100 [ 298.923462] ? htab_map_alloc+0x1190/0x1190 [ 298.927788] map_create+0x3bd/0x1110 [ 298.931506] ? find_held_lock+0x36/0x1c0 [ 298.935571] ? bpf_map_new_fd+0x70/0x70 [ 298.939556] ? __might_fault+0x12b/0x1e0 [ 298.943624] ? lock_downgrade+0x900/0x900 [ 298.947784] ? lock_release+0xa00/0xa00 [ 298.951767] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.957324] ? usercopy_warn+0x110/0x110 [ 298.961412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.966966] __x64_sys_bpf+0x303/0x520 [ 298.970859] ? bpf_prog_get+0x20/0x20 [ 298.974686] do_syscall_64+0x1b9/0x820 [ 298.978580] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.983952] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.988887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.993746] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.998811] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.003838] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.008865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.013720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.018920] RIP: 0033:0x457569 [ 299.022117] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.041028] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 299.048759] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 299.056035] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 299.063304] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 12:24:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b2d, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x6, 0x0) 12:24:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhci\x00', 0x40100, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file0\x00', 0x400, 0x80) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000001480)="735ca5ebb824bbebc05ec1b16867d479f72995df077d2c2e112e6075db652886539182485267dd179a88535844d31743f8446561f47f93a96dad995b45a5d689b7d5858b4f0f23b438825b2f5b757912faf2f5e2524a307a728ea74f759cd579c1e3") pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="4baba88a9184e89688a5a15d37037a39fe0e66e0bb5cb0654931e5f6e787936ec57a7b8c5094d65ad62d255bc93f6de7ad0f179430826e723174c04142b8ca07f8353e0bc3d8dc497c1fcfc94f834865034de1957c595c395b74ba6fe45211c70c32a06c0c682bf5641d40c3543fb38b7899888d23a31e78c6", 0x79}, {&(0x7f0000000300)="8dd5f36efd7e3721fc4412423f0a972eb66873d80f0ef7db85d25ef41e856e973b1c35acdcc4302b13d541898f5cc63760c417f8c16f04a21c22107f640231d6ac8b3f1873c824b796014c38d3f520cf1503546eb663d821b278d29553ddb1287032583979367dbdd8a8bd4279b4c9f9af61cabc09557a943b671b1b7f53343a41437042f5ef0a141782d1c7b7afb03d888b8a865b40ab4eefffa66d3523ae8124810630500331250dd23d81841e12f30134df2e10acfbc5d6abbd8e23a90410b0f3f2d6f5d7b9bafb23e4af0774b3c1356ca73b1307e4e4febbb8300c88a28793e7f0328673b74253b957063dba45d1d7a70d7fbf51bc608cbecf0dc57cfcb16672f358b4fb339bb0ebb3dcdecc8f45abd6d7628333a4422501631e605464f4f823f1542bd81f454efaf998b963e3f8bc360ace7126009d3b7501d63ab5d085a91736f9896f2417ffa0a4235940d1399ec771b912d061d480f3c845d29e1629eaaeceea7f29bd08abea474b636b5dfad8e435ae74983a796c999bb4989053dc7915c4f87b1eaef5e0aec4c1063878ef2601a231f35e57de8e0fac66a6be2cdc6ca9baebfb37a6d3d5429028b607638c99be095a8894d748680517a2e3789ea59d6ee2788a5552d14f8d81431972b827c4e8764d05bf18a8a322b62798ced8aac549e6f2e7bb927668e75140d5aee5d98a0d20ee40ec54739e041fa13723b12c586a15d2f93bdd0df56218a53aead8c6f0d459a168cb8f631d1e5de5519e0dd2fe75ded098c23f681a014bdf3d301db3774089f4a20d6d9b9eaa33550d74d2c74acefe160011920c05676b66f47a7825c55ca2af9212fd48bb1d196a32f6025e0e92366e3849f15e189335084f6acccd925e87ddf9770443da0adf66d0d10398170d901173a5c44d4ead222b105ec7b4a1910d856880c1ca18f02e28c3380e247b651915fa1715eddfda477f5cc78e42e0c018704ed359594ca7d8e405682fd4bef1f883900652b0f125489057ac724d07672bebce04e98e396aa801964dadfa6b352a6b3d0fd4302a74e96dd6480c603650cf4233920a81760f55866483300a5b913e70f172116145dc86a3c04916b2603799267ff400b3b9b3f13c4f3efa88bae2aa4f7822858a8701cd655a045f433fa5b0f1d77ca63d23d3315867e0b7b09a67720f68594fc155f6b0710f5245aa6f574dbe68bd721fcbd47430e2f12bdf97b9b557aac6adad336efaf736c13bae35e6f4b9a2dc8c175f7bb1965cb35ec5f083b2b3b618bc523dd3a399c9b4c9c0cf22db01377342ffc350845de1e0e471cbd88a97f58d97c06bbc1488699571acecec1f2ce55ceb96e1a81f1a1d73f178f0aeab98990cdc044393f23b4f636307b8f3a06d1bcb7fbe498dd9e020ab88ec62cc60a70a7cfaca3cfd2caf390e3dd3fc0d671eca94ee633fd6da8f2c0325780af03bca7ada65dfc407370b8dc710c9c964ebc605c8bb79675c7e691c5eefb32042b0247cd1c64f403af60aae0865bf71302faf0e91ca29ac3e29663332af258c269797ac6af30f24741406064db942bebb56b3fbbccceec57497e794c07f9d15842a47f945ca6781e47aae1abbb71cb3f15b1e233a29cbcc91534b954494392313b68c7ce144a718ab5befc77a67d6067a7854c023b45bfd7129b00d9b7c148ecd39dc13ca8048672eb778d85a06aace6e871da9f3d552de8426467e6bf3803e225b5776d7ba032917b16f84ea4083d7788ca40f9e50b60e23f9c30c53fc7a1548041312e018ce6c6cb9ea3fe85f297e7051c827cb4712ba6b26f0e84733b93915236135df81ce3d86563757ba46053923618a9ed333b2879ceb3d74bd9bcebbc1e77ccc5778ac9fafecd6158fabf71b4b2e7e29665fffbae83b8d585b02d1f49c9c6cbfe3c1f59d95ac00af3f93e6755b68cb2ab7eb6a1e79fa788a365715d4fc2c47250d1e12ca4c185731aa73dfd5afaaa93cf9f8831b7220caec154371fe5d41d340a9c5b0cd9af6ad50f588d3ded4048e09221f677b4a03c3cf7f2a013e7989e1ae0fe40a51aee239035346eb6bdc8ba19985e94c1cdb5e9a6904399e6384c532e457a109c1d97b5d08ba19296633dcfe3402ee197fdaae0e23e3af3107892b42bcccf18d8ab1bcc277d513cc9df14a3b8755e0db1ff1ca9acb23592b0109084755bf8cb2cecef48f8559f41fa6584209bd207663775da073aa483337b4e4bbfb967ad777457ad73ba1d7c453c15b2f03474c16c239798f0d829e7c0ec37bf239fb23309cfce698749c962ffede5cba6601ad4600cc7725d904d4b89ed7b026e2a58f97af71568588409a00207ac0c33210e086856e49b535b6215e932285d3277b024939bd127dcfd252d4b5a12e0d50650bd272eff6002ae0ff1a14fa766cb1f8fd3144db8f510a1089c1e9bd942c859e7afeaa7ee89677fa82f15c70962485e763ed6a30978979552020ed8fbea2e86c0d226d9b142511a19cf33d3c1dc058df78aa07c5dac975888ab9b5ab7fdeeb657127eeffb362ca5ef4e9a19ad7cd5d05089d470ad669a2f4d1ce27998926b13b2a116b37f41473fb79da334202b0b8e077249f7b29cd255eeacc0baf4089cb9ae631e69b3f3de48e9e52da9cc66f42e4601b832ff363cff5e1c8fa7e154319054235ea0823d780bccf4f691401bdf046827c848722af7c934adaf2c1383ac4b5d9421e4c5d94f946dc68bbe2623d8f8a898d25345b1fcbc5621879de5104fd8ddb010422f99fd62bd523c9513e9bcc3326006f089bf7af6a73e68f7062419668e4674fbed608db40689e96e6e9dc5292bc8dc8f69740c7226d62c70b1a3f607ee0e708dd5061758e99921f4bd092e39131beef0792c275062a70d21240acca7bffe02551c99d99f4b38bf82e34608cfb4a7b789de2ec661ea5df557e267867e2ee54ba226870d3a62e6f31ac5ebb0b09dc34d245b2511d2d15a241671f00e4bbcf91a37a2937f0080e1bd394da8345978b74bb985702b5baa16befcbe601f697c43b3a74f98d2ff34f0cc903875d98d992f403b9fdb25cdab1eff5c1570a7b11bce6f3e2289659c5c7818ed77d33d13f8d508798239836d10a302a17116585dca04bc79ec468a2694170dcf5d18aff20bd78feebba6e3b6c5ad402250ca59c7a7927cce72d74fb842212bd409745e726ff93d8a6435f487640891856a91bec321941fb11acccf6e88000854ddf41bb62c819a41a5b2034c8634e334d5820f7ee63a4ade607bca275203e6a497ef1a4c7ac43bcb5a3d3ae22b69d498c5bbafe07f9f5f9613359e6e90f014feba2ab60cad0598452abe2c6f4c71bfff04e4728182b49cfe76ac3f3b92052de5f2778e05c65d6577e449fc07ac2c3c75272c5e9b6bf7a746efb2261a9a34305c7994307fe350c4511de9c8200c177a6532a3898c3eafd2bf8ce70aed6b4e431f7710febf3355b611caf4df44492d230ce6048ceb77074ebc7d60827d423e5ccf086534ae5f7247bba02935e83313ceff138eb904155a78121c23a2b0bbbc3e904e3fceb1ff7fdaeef96aa08465f14d4f57a5cfbc0681de0353a3da524dffc6b7a9339a575c03f75573177915901fadfd651dccf9663cc3c9eba314b0aeb2ca072e925531eefd3ac49deb726165bb0afcd8b155a882efc0193bd7f1417c14c833368ad4cba94c2eb91a2fa7c534bd70c6a2b022a40b1d837d5b421715f86e666d08332d95ad71b5062a9e0ca1d2af3651f0bf1f3df3d8b28201cdd947306bbf2fbb3ffc133313817565b61400688f9c22b400026f653f02fae82b143b070f223040f354174f8bd43de4aeb9dc378f64b50f855cabb85d9d58b54a056025f65670a52a5e0592c2b0c43ca8bc2c83f13b0b3f27deb0f21329975473186ae90fb40764ed1c4223659607ed41e14dcfab185400e5e0ea806eadfd685ef70d0c7edec51294c9b8911f0b604ce700eb05509147de0181546c087de39c0d3e1d3c9ddefb06150fc8c0f61b8f60cf69da6deee51ac1786a0cd46bcbad9bed93c492918f04612723c591c07a245f306f555a0daa32c4f55e066fb8fd3985e99e3fc54d024ecace665f25a56f392f5e8ead4adba34bff07b213cfe8501581f4c55eb5c943ce411b0b99f23f940ccf4cb004a114f474eb5b106ba292b994ab0424a5008d8e464d7a0cbf650d742db9148a60bcb6fe3724c374e6dbec8a5ada23ea4be15575573c8d9b23091dc581a2a141a19c626b8dad03b5c9fd3a09a08652b34660c45da4af6fa7c211b67447711c9324725364f6aafe795af2062522eee82f5c9c02ba9f74ffa52440467078f24793402a2f8bc4c9af7030cfdfdb88c0cf545329521fa9bd02bfe0d6b3c41e0cd1e571310b9ce289cf192523490827a313701596ac7f234a902a597cbf5ab5084c6209b5efd0e6ba20e32a577fd3ddc82982bd4510b553765f5caa0a571e6050ff0f2e4f733a775c87b7cc8bf96f5aec440f3d5004d2c1de444991110aacedf104663b19b0c62c7f96b39e79c258dfd4b08e2c1979482b0fb026c9a7c15bd3b452c9696271543106701e07dcf87acf7fc02a72cf1323f66a4259225880f2a4f8d6d5bcfb27a776065bcb8f0bbbafd74f7be8821d4b9226bd9926f8ed8ebf6f669a632bd5fce711a4a1df1cf114a16c7295579a23a483b5ea0f15b8d6c63409c1a8c456dbf0c7ca24c1ab5d71ddaf35c2f7a7c94680a030ef17a5130370a408218cebe844546d4ed18bc3a204004b1891253cce80e50301dfa6013c8ac940e56994614fb0bef070193b7aaac82abcb3140f596e7884a4e37b73e9744952e010b4c914980de658936507b3b8b2783aba6d9f0c3bcc1e7e409c6c5078b2a778d02a461e6d1c352fa43a48512e0cdca848cb94c8f8cca8b53753a36c555ef3e6a8004405d829c3bc0d105dc68682950ad1bd42829ea674b01eff6ccf43bd4c31aa1e0e6d755e625f130e1c56290ab8a67499be358b864ee5e88101e5cdceafb86f13ff70999701c07d81cdf4c98b97135a738b4f73a96443348bb151441a75425a80fcf6045121dba8795ee5e1a551110e3dabe4b5bc51480457bff4a47b476f41d704a9443bb20e4d4494e1a25d0d212a6ad4d35cbca2090cbe895dd5687857cc352449af21f5dbadf048f0f342bfec3fdd88e0fd527b4e657fbe5fbaf138a3af0ab74f739df4596e82fba4a94414dbb0d0192c3dfa2d9005a614e88a7c7696478c53104d375901081fa58173b1cadf1be3aa5bb5099b686a3464a1cddd5791b0953d9e8ee89d9f6f5836cdb3c532c1bed192f15af8ef17226c6cf7c0ed91056bd0bc70c201e0fc1c96a7395b3d1c971dee2d3bcd7a21343d6757bd7723b796a788fff95f4c5c6b658f44906f80177f9d1fa21b9a12ef3cd03db8879c9ad76ad7bd3ce4b1e50d9549b4a9b92e3c8534b22aab7fc527752845fad2714e7297f619e50368efdd53c75e50133ef0602b2eaebdcf96b68fcdd8bbe66b9dcf210c7c97b4de00b949a3b3bdbe9d965efa19e4ca619cce7d53a5abc5bd1601d7c976b9add8a1efccfe1a3563372b1bd198907e66a6a27085f44e353886380eb829e82d0d3dcbf17092677c619169b6fc9ac78f277cc92191223a6ad0ae10e21c4d02a048b054ea0c640a1b71a5bf1f69e88a0ab5cfeeac17139d811ae331ab1716b5438687e62aff3151727c2a1025ba49285b730aecf83cd070218878e72febf2b5ecb1540c9a4802a9d56e85b875ba43dbf0623c51f8c5f7f183bf08fb99ff6376bf7fd1258a456dceec5d2df44f0a31a5b9282a3fdb9b26a51c9", 0x1000}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x4024) [ 299.070601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 299.077874] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 299.139392] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2200, 0x0) write$P9_RVERSION(r1, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0xfffffffffffffffe, 0x6, '9P2000'}, 0x13) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x600000000000000, 0x0) 12:24:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) r2 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x1) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)=r2) 12:24:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x44000000, 0x0) [ 299.367612] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:34 executing program 4 (fault-call:2 fault-nth:36): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 299.524681] FAULT_INJECTION: forcing a failure. [ 299.524681] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 299.579070] CPU: 1 PID: 11338 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 299.586449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.595808] Call Trace: [ 299.598388] dump_stack+0x244/0x39d [ 299.602006] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.607201] ? finish_task_switch+0x1f4/0x910 [ 299.611690] should_fail.cold.4+0xa/0x17 [ 299.615745] ? trace_hardirqs_on+0xbd/0x310 [ 299.620058] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.625151] ? zap_class+0x640/0x640 [ 299.628850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.634373] ? _raw_spin_unlock_irq+0x60/0x80 [ 299.638852] ? finish_task_switch+0x1f4/0x910 [ 299.643328] ? finish_task_switch+0x1b4/0x910 [ 299.647809] ? find_held_lock+0x36/0x1c0 [ 299.651861] ? check_preemption_disabled+0x48/0x280 [ 299.656861] ? lock_release+0xa00/0xa00 [ 299.660822] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.666261] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.671787] ? rcu_pm_notify+0xc0/0xc0 [ 299.675673] ? __might_sleep+0x95/0x190 [ 299.679653] __alloc_pages_nodemask+0x366/0xea0 [ 299.684305] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 299.688877] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 299.693877] ? retint_kernel+0x1b/0x2d [ 299.697771] ? trace_hardirqs_on+0x310/0x310 [ 299.702211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 299.707748] alloc_pages_current+0x173/0x350 [ 299.712146] __vmalloc_node_range+0x498/0x750 [ 299.716636] ? htab_map_alloc+0x29e/0x1190 [ 299.720856] __vmalloc_node_flags_caller+0x75/0x90 [ 299.725770] ? htab_map_alloc+0x29e/0x1190 [ 299.729990] bpf_map_area_alloc+0x6f/0x90 [ 299.734123] htab_map_alloc+0x29e/0x1190 [ 299.738179] htab_of_map_alloc+0x7d/0x100 [ 299.742310] ? htab_map_alloc+0x1190/0x1190 [ 299.746657] map_create+0x3bd/0x1110 [ 299.750374] ? find_held_lock+0x36/0x1c0 [ 299.754420] ? bpf_map_new_fd+0x70/0x70 [ 299.758397] ? __might_fault+0x12b/0x1e0 [ 299.762455] ? lock_downgrade+0x900/0x900 [ 299.766606] ? lock_release+0xa00/0xa00 [ 299.770564] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.775999] ? usercopy_warn+0x110/0x110 [ 299.780052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.785574] __x64_sys_bpf+0x303/0x520 [ 299.789460] ? bpf_prog_get+0x20/0x20 [ 299.793261] do_syscall_64+0x1b9/0x820 [ 299.797132] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.802479] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.807396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.812227] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.817231] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.822239] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.827252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.832142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.837322] RIP: 0033:0x457569 [ 299.840503] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.859483] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 299.867173] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 299.874438] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 299.881692] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 299.888946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 299.896197] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x600, 0x0) 12:24:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400000, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) getegid() 12:24:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x2d0b0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:34 executing program 4 (fault-call:2 fault-nth:37): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) writev(r0, &(0x7f0000001680)=[{&(0x7f0000000080)="084d3385510a50a5dde3677fbb6d6bc78fd2a9dd22bd09f6df5dd843054ab2d76f29448ea335ae8da1c143cdf0ac7c81cc6d3e8c62bfdf23088a46769328b2e29f5139090060b1e37d9f4fea116fff8b3eeb8a8633ddeb6a8716", 0x5a}, {&(0x7f0000000100)="decb89251234a90b4632faab10d0035c41a53445ccfce524a59c989ca07b202f2484caf4a28870d1f75af4e80ba6607d4d18161fc8f87721eaa7e390333b244b9d029e1cef6aefe80f7653fc56e0e6c73a3c2404148db585e6d5489f75f6852f031aa3dc7af5f84a9701fdee5d8cc4df5d0106b2dc22c015d5f0a0af33516ed556692920846ecdf7740828", 0x8b}, {&(0x7f00000001c0)="bffc35e93912ccd138f2d766a9f148a1fab547471a130d542ebf559d91141291ab32debe7839cbdb43c27a940029ca6ba5a788ed2c173ce57d9e2d03dfe12f0d060a01fc7b02be0ee371a7bb26b1d7d266e496953a9f63176d939d92ea6fdf523f0b67265461e467bf0df9cbb498bf8e0efd75a47943f484", 0x78}, {&(0x7f0000000300)="407595e4a0679e9bdc43e11ff710d75b1d217b6fed692ef36f983ba1214b3fe69815089987f8a310ad519f3d6baaeabf3af0a7406f334e2548840a84530c6dcc89d65c71279c07482bcafba631de5bcad63b361e1f8b6bd9c085852bf13435d0af45bab07f2ebf936fb0d2e6c0bf2fa1d55992efa0950a59d8ddf867f668731c9e4486244c37bb23bf8392e05682f38e7c57d25d4c0a737bceab9a0c2928a98635571d9633177803543aefc9bd64d4b8951c229b686043f206d53958ac2cea40656f3323b31d6aa7a431d6b6de95ba2ccf46a5e1d02df168075406b577058318af45f15dc6e8fb06ea09", 0xea}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="14c93fdb07999ad1b6b94072ea4d3fbb808aa86c0780adac1a71592b117cc54c51cb9d70ee4fd6dd88920943bcfbd9d76e947d53da6305e977518d740cdbb370855233f15e4c841db891089c6f278a3200ff9cdd1765e7baf6323bc69dbf021e7ac8ea586c06f0ffc988307cdba91d81f24f9bda33bb4aa70db5b7683a3c167ac5fbc3fc21e5fe072160560bcf2b0d84cebd5cc7d015efddb8c5bf2c8f7f223ed043ea6b51e77fbd30cbf463b586a04db6971a84451d4adb253c635438f001539bc392e07e", 0xc5}, {&(0x7f0000001500)="07a60783fa168e3cc27b4fa47b0da04712ef514fb6e24b749bbfeb1bd9cc3fad32968a7b070ddbe237688b19a3529554621003282300837bf14c8fa7f103914508f75c6a1372654404012d5a6b7d52c92a4a314f514c94535a8cd25e199ba13fbca898cd8b62451fd4fabcd86a8912e55a26de8b4b4b8520575ac2f43378e3b318ec7922eb8a22ff224364abb2b9ba0139988802486354254c1d366cbb1d9ce06e48921e9d2ed6966e867eeef67d8d59d0e8c51a8848e5a05ee0aa077a964b191074815e3522bb67af2fd07da3", 0xcd}, {&(0x7f0000000240)="7213dafd64fc44cf5b1980712850d2a6532d2084", 0x14}, {&(0x7f0000001600)="2eefaa7d9213dcc1c35bd9c1205655545eee3538a683ad1b8f840bc4ac0a7e19a5ee87c8d1d5cf84012e6a6f2c09ae0fcf0653e0316c6f7f42d17a1e0535913c79ea0440d4337194f557111bc6969ce2647e5e11cc", 0x55}], 0x9) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 300.095102] FAULT_INJECTION: forcing a failure. [ 300.095102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 300.117983] CPU: 0 PID: 11350 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 300.125364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.125371] Call Trace: [ 300.125398] dump_stack+0x244/0x39d [ 300.125423] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.125445] ? find_held_lock+0x36/0x1c0 [ 300.125477] should_fail.cold.4+0xa/0x17 [ 300.154312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.154332] ? zap_class+0x640/0x640 [ 300.154347] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 300.154365] ? kasan_check_read+0x11/0x20 [ 300.154382] ? rcu_softirq_qs+0x20/0x20 [ 300.154405] ? unwind_dump+0x190/0x190 [ 300.168133] ? find_held_lock+0x36/0x1c0 [ 300.168168] ? check_preemption_disabled+0x48/0x280 [ 300.168188] ? lock_release+0xa00/0xa00 [ 300.168204] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.168227] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.180207] ? rcu_pm_notify+0xc0/0xc0 [ 300.180231] ? __might_sleep+0x95/0x190 [ 300.180253] __alloc_pages_nodemask+0x366/0xea0 [ 300.180270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.180292] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 300.180315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.193342] ? check_preemption_disabled+0x48/0x280 [ 300.193370] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.193413] ? kasan_unpoison_shadow+0x35/0x50 [ 300.212219] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 300.212244] alloc_pages_current+0x173/0x350 [ 300.212267] __vmalloc_node_range+0x498/0x750 [ 300.212297] ? htab_map_alloc+0x29e/0x1190 [ 300.212314] __vmalloc_node_flags_caller+0x75/0x90 [ 300.212333] ? htab_map_alloc+0x29e/0x1190 [ 300.222381] bpf_map_area_alloc+0x6f/0x90 [ 300.237916] htab_map_alloc+0x29e/0x1190 [ 300.237953] htab_of_map_alloc+0x7d/0x100 [ 300.237970] ? htab_map_alloc+0x1190/0x1190 12:24:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0xe7ec72bc2a61a64d) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) [ 300.237984] map_create+0x3bd/0x1110 [ 300.238002] ? find_held_lock+0x36/0x1c0 [ 300.238019] ? bpf_map_new_fd+0x70/0x70 [ 300.238041] ? __might_fault+0x12b/0x1e0 [ 300.238058] ? lock_downgrade+0x900/0x900 [ 300.238077] ? lock_release+0xa00/0xa00 [ 300.248175] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.248196] ? usercopy_warn+0x110/0x110 [ 300.248227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.266888] __x64_sys_bpf+0x303/0x520 [ 300.266905] ? bpf_prog_get+0x20/0x20 [ 300.266943] do_syscall_64+0x1b9/0x820 [ 300.266959] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.266978] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.267000] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.280285] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.292803] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.292823] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.292846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.292871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.292884] RIP: 0033:0x457569 12:24:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x9, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 300.292904] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.292918] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.304629] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 300.304638] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 300.304662] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 300.304671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x15, 0x0) [ 300.304679] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 300.321101] IPVS: ftp: loaded support on port[0] = 21 [ 300.471595] netlink: 'syz-executor5': attribute type 17 has an invalid length. 12:24:35 executing program 4 (fault-call:2 fault-nth:38): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x1500, 0x0) [ 300.638659] FAULT_INJECTION: forcing a failure. [ 300.638659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 300.705826] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 300.712214] CPU: 0 PID: 11386 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 300.720588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.729942] Call Trace: [ 300.732554] dump_stack+0x244/0x39d [ 300.736207] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.741424] ? find_held_lock+0x36/0x1c0 [ 300.745520] should_fail.cold.4+0xa/0x17 [ 300.749627] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.754755] ? zap_class+0x640/0x640 [ 300.758502] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 300.763462] ? kasan_check_read+0x11/0x20 [ 300.767621] ? rcu_softirq_qs+0x20/0x20 [ 300.771613] ? unwind_dump+0x190/0x190 [ 300.775522] ? find_held_lock+0x36/0x1c0 [ 300.779615] ? check_preemption_disabled+0x48/0x280 [ 300.784668] ? lock_release+0xa00/0xa00 [ 300.788656] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.794119] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.799670] ? rcu_pm_notify+0xc0/0xc0 12:24:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x80, 0x8020000000000000, 0xfff, 0x1, 0xffffffff}, &(0x7f0000000140)=0x14) [ 300.803568] ? __might_sleep+0x95/0x190 [ 300.807562] __alloc_pages_nodemask+0x366/0xea0 [ 300.812259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.817639] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 300.822683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.828230] ? check_preemption_disabled+0x48/0x280 [ 300.828256] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.828296] ? kasan_unpoison_shadow+0x35/0x50 [ 300.828313] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 300.828335] alloc_pages_current+0x173/0x350 [ 300.838883] __vmalloc_node_range+0x498/0x750 [ 300.838912] ? htab_map_alloc+0x29e/0x1190 [ 300.838931] __vmalloc_node_flags_caller+0x75/0x90 [ 300.838948] ? htab_map_alloc+0x29e/0x1190 [ 300.838966] bpf_map_area_alloc+0x6f/0x90 [ 300.838985] htab_map_alloc+0x29e/0x1190 [ 300.839017] htab_of_map_alloc+0x7d/0x100 [ 300.883717] ? htab_map_alloc+0x1190/0x1190 [ 300.888065] map_create+0x3bd/0x1110 [ 300.891797] ? find_held_lock+0x36/0x1c0 [ 300.895872] ? bpf_map_new_fd+0x70/0x70 [ 300.899868] ? __might_fault+0x12b/0x1e0 12:24:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x80000001, 0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000140)=0x4, 0x4) r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) r3 = dup3(r0, r0, 0x80000) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f00000000c0)={0x8000, 0x7, 0x3}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) prctl$PR_GET_TIMERSLACK(0x1e) [ 300.903945] ? lock_downgrade+0x900/0x900 [ 300.908124] ? lock_release+0xa00/0xa00 [ 300.912120] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.917589] ? usercopy_warn+0x110/0x110 [ 300.921677] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.927236] __x64_sys_bpf+0x303/0x520 [ 300.931131] ? bpf_prog_get+0x20/0x20 [ 300.934964] do_syscall_64+0x1b9/0x820 [ 300.938860] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.944240] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.949182] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:24:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) socket$inet6_sctp(0xa, 0x5, 0x84) [ 300.954040] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.959526] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.964558] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.969598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.974463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.979676] RIP: 0033:0x457569 [ 300.982886] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.001794] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 301.009509] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 301.009519] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 301.009529] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.009539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 301.009549] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x66, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 301.348054] device bridge_slave_1 left promiscuous mode [ 301.353584] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.398178] device bridge_slave_0 left promiscuous mode [ 301.403614] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.480650] team0 (unregistering): Port device team_slave_1 removed [ 301.490766] team0 (unregistering): Port device team_slave_0 removed [ 301.503590] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 301.561680] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 301.622718] bond0 (unregistering): Released all slaves [ 302.045598] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.073649] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.082532] device bridge_slave_0 entered promiscuous mode [ 302.133665] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.140242] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.149061] device bridge_slave_1 entered promiscuous mode [ 302.192141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 302.235850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 302.376247] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 302.425182] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 302.641017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 302.648490] team0: Port device team_slave_0 added [ 302.694209] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 302.701987] team0: Port device team_slave_1 added [ 302.746923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.796991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.844512] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 302.851630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.860032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.906311] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 302.913522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.929997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.272406] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.278792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.285365] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.291820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.299239] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 304.209629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.217850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.302051] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 304.391160] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 304.397336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.404364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.496165] 8021q: adding VLAN 0 to HW filter on device team0 12:24:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4600005e89b8b5f34c8731ce415e0d9ec2000000000000000014000300030008000000000000004d55000000000000000000000000200045"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x9, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x800, 0x8, 0x45bd}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x41, 0x8000, 0x9, 0x1, r1}, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000000)=0x84) 12:24:39 executing program 4 (fault-call:2 fault-nth:39): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x44) 12:24:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10af2, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x66, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x4000000001000) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x3f, &(0x7f0000000080)=0x4) [ 305.108636] FAULT_INJECTION: forcing a failure. [ 305.108636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.117086] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 305.158357] CPU: 1 PID: 11692 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 305.165804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.175189] Call Trace: [ 305.177802] dump_stack+0x244/0x39d [ 305.181457] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.186673] ? find_held_lock+0x36/0x1c0 [ 305.190762] should_fail.cold.4+0xa/0x17 [ 305.194840] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.199953] ? zap_class+0x640/0x640 [ 305.203698] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 305.208629] ? kasan_check_read+0x11/0x20 [ 305.212798] ? rcu_softirq_qs+0x20/0x20 [ 305.216783] ? unwind_dump+0x190/0x190 [ 305.220682] ? find_held_lock+0x36/0x1c0 [ 305.224848] ? ata_port_alloc+0x3f0/0x700 [ 305.229020] ? check_preemption_disabled+0x48/0x280 [ 305.234043] ? lock_release+0xa00/0xa00 [ 305.238020] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.243478] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.249027] ? rcu_pm_notify+0xc0/0xc0 [ 305.252926] ? __might_sleep+0x95/0x190 [ 305.256914] __alloc_pages_nodemask+0x366/0xea0 [ 305.261603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.266991] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 305.272016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.277557] ? check_preemption_disabled+0x48/0x280 [ 305.282589] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.288154] ? kasan_unpoison_shadow+0x35/0x50 [ 305.292752] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 305.298303] alloc_pages_current+0x173/0x350 [ 305.302819] __vmalloc_node_range+0x498/0x750 [ 305.307327] ? htab_map_alloc+0x29e/0x1190 [ 305.311573] __vmalloc_node_flags_caller+0x75/0x90 [ 305.316506] ? htab_map_alloc+0x29e/0x1190 [ 305.320756] bpf_map_area_alloc+0x6f/0x90 [ 305.324913] htab_map_alloc+0x29e/0x1190 [ 305.328995] htab_of_map_alloc+0x7d/0x100 [ 305.333149] ? htab_map_alloc+0x1190/0x1190 [ 305.337507] map_create+0x3bd/0x1110 [ 305.341244] ? find_held_lock+0x36/0x1c0 [ 305.345319] ? bpf_map_new_fd+0x70/0x70 [ 305.349314] ? __might_fault+0x12b/0x1e0 [ 305.353399] ? lock_downgrade+0x900/0x900 [ 305.357556] ? lock_release+0xa00/0xa00 [ 305.361532] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.367007] ? usercopy_warn+0x110/0x110 [ 305.371093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.376639] __x64_sys_bpf+0x303/0x520 [ 305.380534] ? bpf_prog_get+0x20/0x20 [ 305.384362] do_syscall_64+0x1b9/0x820 [ 305.388259] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.393634] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.398579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.403437] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.408478] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.413506] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.418533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.423388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.428579] RIP: 0033:0x457569 [ 305.431794] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.450724] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 305.458460] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 305.465739] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 305.473028] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.480304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 305.487581] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x6000000) 12:24:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b25, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:40 executing program 4 (fault-call:2 fault-nth:40): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x10000) pread64(r0, &(0x7f0000000300)=""/4096, 0x1000, 0x0) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x1100) 12:24:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100), 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 305.661242] FAULT_INJECTION: forcing a failure. [ 305.661242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.706537] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 305.722965] CPU: 0 PID: 11724 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 305.730392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.739765] Call Trace: [ 305.739795] dump_stack+0x244/0x39d [ 305.739817] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.739840] ? find_held_lock+0x36/0x1c0 [ 305.739872] should_fail.cold.4+0xa/0x17 [ 305.746128] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.746148] ? zap_class+0x640/0x640 [ 305.746166] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 305.764535] ? kasan_check_read+0x11/0x20 [ 305.764556] ? rcu_softirq_qs+0x20/0x20 [ 305.764574] ? unwind_dump+0x190/0x190 [ 305.764597] ? find_held_lock+0x36/0x1c0 [ 305.764619] ? netdev_boot_base+0x90/0x170 [ 305.781401] ? check_preemption_disabled+0x48/0x280 [ 305.781424] ? lock_release+0xa00/0xa00 [ 305.781441] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.781464] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.789405] ? rcu_pm_notify+0xc0/0xc0 [ 305.798638] ? __might_sleep+0x95/0x190 [ 305.798663] __alloc_pages_nodemask+0x366/0xea0 [ 305.798680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.798701] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 305.798719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.798738] ? check_preemption_disabled+0x48/0x280 [ 305.798781] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.798816] ? kasan_unpoison_shadow+0x35/0x50 [ 305.798832] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 305.798853] alloc_pages_current+0x173/0x350 [ 305.808274] __vmalloc_node_range+0x498/0x750 [ 305.808302] ? htab_map_alloc+0x29e/0x1190 [ 305.808319] __vmalloc_node_flags_caller+0x75/0x90 [ 305.808338] ? htab_map_alloc+0x29e/0x1190 [ 305.821737] bpf_map_area_alloc+0x6f/0x90 [ 305.821774] htab_map_alloc+0x29e/0x1190 [ 305.821809] htab_of_map_alloc+0x7d/0x100 [ 305.821828] ? htab_map_alloc+0x1190/0x1190 [ 305.831842] map_create+0x3bd/0x1110 12:24:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0xfffffffffffffdd3) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x4400) [ 305.831860] ? find_held_lock+0x36/0x1c0 [ 305.831875] ? bpf_map_new_fd+0x70/0x70 [ 305.831895] ? __might_fault+0x12b/0x1e0 [ 305.831913] ? lock_downgrade+0x900/0x900 [ 305.831934] ? lock_release+0xa00/0xa00 [ 305.831949] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.831969] ? usercopy_warn+0x110/0x110 [ 305.832002] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.842537] __x64_sys_bpf+0x303/0x520 [ 305.842561] ? bpf_prog_get+0x20/0x20 [ 305.842596] do_syscall_64+0x1b9/0x820 [ 305.853121] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.853144] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.853161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.853186] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.853204] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.853222] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.853242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.876512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.876527] RIP: 0033:0x457569 12:24:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x66, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 305.876544] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.876557] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 305.889852] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 305.889863] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 305.889872] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.889882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 12:24:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc58a155806a9d05a, 0x8) getsockopt$inet_dccp_buf(r0, 0x21, 0x8f, &(0x7f0000000300)=""/4096, &(0x7f0000000040)=0x1000) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 305.889892] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x2, 0x30, 0x401, 0x7}, &(0x7f0000000080)=0x18) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000140)=0x5, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x80000001, 0xb1c}, &(0x7f0000000100)=0x8) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffff9c, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x7, 0x8, &(0x7f0000000180)=0xfffffffffffffff7}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x4400000000000000) 12:24:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xff7f000000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:41 executing program 4 (fault-call:2 fault-nth:41): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c320000000000000000000000000300030000000000007000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x200200) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x20}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={r2, 0x80000, r3}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:ipmi_device_t:s0\x00', 0x23, 0x3) 12:24:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x100000000000000) [ 306.332659] FAULT_INJECTION: forcing a failure. [ 306.332659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 306.377688] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 306.382932] CPU: 0 PID: 11780 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 306.392484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.401841] Call Trace: [ 306.404440] dump_stack+0x244/0x39d [ 306.408081] ? dump_stack_print_info.cold.1+0x20/0x20 [ 306.413290] ? find_held_lock+0x36/0x1c0 [ 306.417360] should_fail.cold.4+0xa/0x17 [ 306.421433] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.426545] ? zap_class+0x640/0x640 [ 306.430262] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 306.435197] ? kasan_check_read+0x11/0x20 [ 306.439362] ? rcu_softirq_qs+0x20/0x20 [ 306.443338] ? unwind_dump+0x190/0x190 [ 306.447234] ? find_held_lock+0x36/0x1c0 [ 306.451389] ? usnic_ib_sysfs_register_usdev+0x40/0x90 [ 306.456680] ? check_preemption_disabled+0x48/0x280 [ 306.461702] ? lock_release+0xa00/0xa00 [ 306.465680] ? perf_trace_sched_process_exec+0x860/0x860 [ 306.471148] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 306.476687] ? rcu_pm_notify+0xc0/0xc0 [ 306.480594] ? __might_sleep+0x95/0x190 [ 306.484576] __alloc_pages_nodemask+0x366/0xea0 [ 306.489250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.494621] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 306.499642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.505180] ? check_preemption_disabled+0x48/0x280 [ 306.510206] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 306.515780] ? kasan_unpoison_shadow+0x35/0x50 [ 306.520383] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 306.525991] alloc_pages_current+0x173/0x350 [ 306.530406] __vmalloc_node_range+0x498/0x750 [ 306.534917] ? htab_map_alloc+0x29e/0x1190 [ 306.539160] __vmalloc_node_flags_caller+0x75/0x90 [ 306.544093] ? htab_map_alloc+0x29e/0x1190 [ 306.548328] bpf_map_area_alloc+0x6f/0x90 [ 306.552481] htab_map_alloc+0x29e/0x1190 [ 306.556592] htab_of_map_alloc+0x7d/0x100 [ 306.560750] ? htab_map_alloc+0x1190/0x1190 [ 306.565078] map_create+0x3bd/0x1110 [ 306.568800] ? find_held_lock+0x36/0x1c0 [ 306.572866] ? bpf_map_new_fd+0x70/0x70 [ 306.576843] ? __might_fault+0x12b/0x1e0 [ 306.580907] ? lock_downgrade+0x900/0x900 [ 306.585059] ? lock_release+0xa00/0xa00 [ 306.589034] ? perf_trace_sched_process_exec+0x860/0x860 [ 306.594489] ? usercopy_warn+0x110/0x110 [ 306.598569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.604110] __x64_sys_bpf+0x303/0x520 [ 306.608002] ? bpf_prog_get+0x20/0x20 [ 306.611840] do_syscall_64+0x1b9/0x820 [ 306.615728] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.621105] ? syscall_return_slowpath+0x5e0/0x5e0 [ 306.626036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.630883] ? trace_hardirqs_on_caller+0x310/0x310 [ 306.635916] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 306.640940] ? prepare_exit_to_usermode+0x291/0x3b0 [ 306.645967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.650817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.656010] RIP: 0033:0x457569 [ 306.659204] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.678103] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.685825] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 306.693097] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 306.700378] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 306.707662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 306.714949] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x1f}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x8, [0x4, 0x1000, 0x6, 0x6, 0x3, 0x1e92, 0xffffffff, 0x7ff]}, 0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={r2, 0x1228, 0x0, 0x5, 0x80000000, 0x8000, 0x8, 0xf000000000000000, {r1, @in={{0x2, 0x4e21, @rand_addr=0x3}}, 0x80000001, 0x5, 0x63b, 0x100000001, 0x1}}, &(0x7f0000000180)=0xb0) 12:24:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x1000000) [ 306.853484] sctp: [Deprecated]: syz-executor0 (pid 11806) Use of struct sctp_assoc_value in delayed_ack socket option. [ 306.853484] Use struct sctp_sack_info instead 12:24:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x66, &(0x7f0000000200)={r2, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000001380)=ANY=[], 0x3f5) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xbb0a010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:41 executing program 4 (fault-call:2 fault-nth:42): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x15) [ 306.910891] sctp: [Deprecated]: syz-executor0 (pid 11806) Use of struct sctp_assoc_value in delayed_ack socket option. [ 306.910891] Use struct sctp_sack_info instead [ 306.962908] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 307.016448] FAULT_INJECTION: forcing a failure. [ 307.016448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.029177] CPU: 1 PID: 11829 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 307.036571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.045930] Call Trace: [ 307.045970] dump_stack+0x244/0x39d [ 307.046002] ? dump_stack_print_info.cold.1+0x20/0x20 [ 307.046036] ? find_held_lock+0x36/0x1c0 [ 307.046066] should_fail.cold.4+0xa/0x17 [ 307.052279] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.052300] ? zap_class+0x640/0x640 [ 307.052316] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 307.052334] ? kasan_check_read+0x11/0x20 [ 307.052354] ? rcu_softirq_qs+0x20/0x20 [ 307.061894] ? unwind_dump+0x190/0x190 [ 307.071050] ? find_held_lock+0x36/0x1c0 [ 307.071087] ? check_preemption_disabled+0x48/0x280 [ 307.071104] ? lock_release+0xa00/0xa00 [ 307.071121] ? perf_trace_sched_process_exec+0x860/0x860 [ 307.071138] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 12:24:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={0x0, @in={{0x2, 0x81, @multicast2}}}, &(0x7f00000004c0)=0xffffffffffffff9a) r2 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x4e20, @empty}}}, &(0x7f00000002c0)=0xfffffffffffffe27) r3 = shmget(0x1, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000300)=""/251) [ 307.071158] ? rcu_pm_notify+0xc0/0xc0 [ 307.079792] ? __might_sleep+0x95/0x190 [ 307.079816] __alloc_pages_nodemask+0x366/0xea0 [ 307.079834] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.079856] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 307.079875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.079893] ? check_preemption_disabled+0x48/0x280 [ 307.079917] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 307.088058] ? kasan_unpoison_shadow+0x35/0x50 [ 307.088077] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 12:24:42 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = socket(0x15, 0xa, 0x3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={r2, 0x1}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback, 0x1}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r3, 0x100000001, 0x9, [0x3d, 0x6, 0x40, 0x2, 0x3, 0x0, 0x1, 0x4, 0x0]}, 0x1a) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 307.088101] alloc_pages_current+0x173/0x350 [ 307.088124] __vmalloc_node_range+0x498/0x750 [ 307.088151] ? htab_map_alloc+0x29e/0x1190 [ 307.096083] __vmalloc_node_flags_caller+0x75/0x90 [ 307.096103] ? htab_map_alloc+0x29e/0x1190 [ 307.096121] bpf_map_area_alloc+0x6f/0x90 [ 307.096141] htab_map_alloc+0x29e/0x1190 [ 307.096173] htab_of_map_alloc+0x7d/0x100 [ 307.105147] ? htab_map_alloc+0x1190/0x1190 [ 307.105163] map_create+0x3bd/0x1110 [ 307.105182] ? find_held_lock+0x36/0x1c0 [ 307.105200] ? bpf_map_new_fd+0x70/0x70 [ 307.105221] ? __might_fault+0x12b/0x1e0 [ 307.105238] ? lock_downgrade+0x900/0x900 [ 307.105289] ? lock_release+0xa00/0xa00 [ 307.116272] ? perf_trace_sched_process_exec+0x860/0x860 [ 307.116295] ? usercopy_warn+0x110/0x110 [ 307.116347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.116383] __x64_sys_bpf+0x303/0x520 [ 307.116415] ? bpf_prog_get+0x20/0x20 [ 307.124293] do_syscall_64+0x1b9/0x820 [ 307.124311] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.124331] ? syscall_return_slowpath+0x5e0/0x5e0 12:24:42 executing program 0: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x1, 0x4) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x1, [@remote]}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2fb) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 307.124346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.124367] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.134399] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.134420] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.134443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.134469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.134481] RIP: 0033:0x457569 [ 307.134499] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.145031] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 307.145048] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 307.145058] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 307.145067] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 307.145077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 307.145087] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 307.382294] [ 307.389782] kobject: 'tx-3' (000000002964051a): kobject_uevent_env [ 307.390278] ==================================== [ 307.396151] kobject: 'tx-3' (000000002964051a): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-3' [ 307.396240] kobject: 'tx-4' (000000000388a867): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.423610] kobject: 'tx-4' (000000000388a867): kobject_uevent_env 12:24:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x6, 0x8003, 0xfffffffffffffffe, 0x8001, 0x0, 0x2, 0x8, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r1, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 307.427732] WARNING: syz-executor1/11847 still has locks held! [ 307.436344] kobject: 'tx-4' (000000000388a867): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-4' [ 307.436375] 4.20.0-rc5+ #362 Not tainted [ 307.451728] ------------------------------------ [ 307.455662] kobject: 'tx-5' (00000000b2b9be5c): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.461585] 1 lock held by syz-executor1/11847: [ 307.466415] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 307.477363] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 307.479600] #0: 00000000959d3181 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 307.497721] [ 307.497721] stack backtrace: [ 307.502514] CPU: 1 PID: 11847 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #362 [ 307.509887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.514783] kobject: 'tx-5' (00000000b2b9be5c): kobject_uevent_env [ 307.519238] Call Trace: [ 307.519267] dump_stack+0x244/0x39d [ 307.519286] ? dump_stack_print_info.cold.1+0x20/0x20 [ 307.519376] ? vprintk_func+0x85/0x181 [ 307.529638] kobject: 'tx-5' (00000000b2b9be5c): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-5' [ 307.531820] debug_check_no_locks_held.cold.49+0x93/0x9f [ 307.531840] flush_old_exec+0x1ea2/0x2480 [ 307.537135] kobject: 'tx-6' (00000000d0020cae): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.540894] ? save_stack+0x43/0xd0 [ 307.540908] ? __kmalloc+0x15b/0x760 [ 307.540930] ? copy_strings_kernel+0x110/0x110 [ 307.541018] ? iov_iter_init+0xe5/0x210 [ 307.551543] kobject: 'tx-6' (00000000d0020cae): kobject_uevent_env [ 307.556697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.556713] ? __vfs_read+0x11f/0x9b0 [ 307.556733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.561032] kobject: 'tx-6' (00000000d0020cae): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-6' [ 307.570298] ? fsnotify+0x50e/0xef0 [ 307.570316] ? fsnotify+0xef0/0xef0 [ 307.574079] kobject: 'tx-7' (000000007b11b03e): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.577636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.577652] ? fsnotify_first_mark+0x350/0x350 [ 307.577672] ? __fsnotify_parent+0xcc/0x430 [ 307.582466] kobject: 'tx-7' (000000007b11b03e): kobject_uevent_env [ 307.586206] ? fsnotify+0xef0/0xef0 [ 307.586232] ? rw_verify_area+0x118/0x360 [ 307.592631] kobject: 'tx-7' (000000007b11b03e): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-7' [ 307.598062] ? vfs_read+0x1ce/0x3c0 [ 307.598080] ? kernel_read+0xab/0x120 [ 307.598100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 307.602010] kobject: 'tx-8' (0000000085a06f67): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.607448] ? load_elf_phdrs+0x1e4/0x270 [ 307.607466] ? writenote+0x3d0/0x3d0 [ 307.618056] kobject: 'tx-8' (0000000085a06f67): kobject_uevent_env [ 307.621413] ? __kasan_slab_free+0x119/0x150 [ 307.621435] load_elf_binary+0xa9a/0x5cf0 [ 307.625109] kobject: 'tx-8' (0000000085a06f67): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-8' [ 307.634397] ? find_held_lock+0x36/0x1c0 [ 307.634423] ? notesize.isra.6+0x80/0x80 [ 307.634506] ? ima_file_mmap+0x160/0x160 [ 307.640132] kobject: 'tx-9' (00000000743583f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.644534] ? lock_downgrade+0x900/0x900 [ 307.644559] ? kasan_check_write+0x14/0x20 [ 307.649108] kobject: 'tx-9' (00000000743583f8): kobject_uevent_env [ 307.655172] search_binary_handler+0x17d/0x570 [ 307.655192] __do_execve_file.isra.33+0x1661/0x25d0 12:24:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="be0000e200000000"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfsd\x00', 0x400, &(0x7f0000000100)='Feth0vmnet1bdevprocbdevvboxnet0\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) clock_gettime(0x3, &(0x7f0000000880)) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000300)=@l2={0x1f, 0x7, {0x4, 0x6, 0xdc9, 0x7, 0x3, 0x10001}, 0x6, 0x1}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000380)="71552a52d0d344eef860e7a226dd376a6272d159f5a3e49e2371669e866857b06c06a470a12535de4554cdb86934e817e652bd8c07543e4eadad161fea46397b0d26c028a17a96135a25704d2942903a0b46a856e106993744adc03406bb5b6d89717b9bf2444d6d1c2e706a6cdec4b88f7c35567d6b24172f47ef7abc6b012c3fe70f0b269d5adc708b9efd58ed214ee217fbb8bb695e3a764a5764640ba4d94e593ba3dd82904a59f87c4a4be74a12aa2d7a8d378e589c589001d5b8d4b58c519e5a5a6ecaa985baf29c4abbc343147f", 0xd1}, {&(0x7f0000000480)="10274f90aabeab97cb2411578a6a9850755f7cd91c4ea3fb843ccb864fba3bc19bc03bc57771e2a01f41c53520328a1f7d3ca9573fa88d5041c715b3f4134a75fab1e60ee2b68994f50b18ef2b6b4701fc6e9ab4a27c62941cb44a198fb078ad589f16a6fe9d267ebdde51bf086bd5d73fc4dd9ec11c5ee729cc79086f3e186a7630b14aba466ed0ae36", 0x8a}, {&(0x7f0000000540)="848662c8117bd71e48e92c7d424e51bf77142916718a5987bb82a70231b5474d7f9a156df5e03115208e09a28509685e320be6400755c320cf230d36719c9d21aeb018feb3299bf960ad16d64ac319d9da4edb8f8303b09e9c84bf11b663be66e886c0b6a295dfa741d2f9139a7e66a97acdca11b58e5623edf4", 0x7a}, {&(0x7f00000005c0)="ab36beaa5a7dc3453dc3641dc3a64921cba2591a9df0f1cd01fb23a4c4044f255ff83731973f850e11e7d529cb252ab9081e118b47054fbbfd6cf6238ce3a80a1cb2cb52223156dfdbaeb4210bdd97890118813417adec4e70456176ddd6469e7553388848a3c21facb983dfb1d16d8f2be41d7b7929777b", 0x78}], 0x4, &(0x7f0000000680)=[{0xb0, 0x1, 0x4, "90e93ebb1eaaaba1e995ade6a103fe4cdd7c05adaf9f4984e77094d4f2ba5863e8b64e4c50cfae5573ecdcea489b990a0ca169ac438dde2b3f794fdb00178e1e5bad61d61bafe9901c4c50c7aca8e4ca04911f97ea6e48ba94b4d231b84c8b54764120ddf020df0e07f19dd66ff33a9b3f032bdabac52696bb8e6414c6bd4eb985f4676b91ffe2c2ea4d61cbc78e4eb96216e72180b30ebb8127"}, {0x28, 0x108, 0x101, "5bf3a0ef10eb9a370a25b1bfcfcedeab6978d6fe84fae0"}, {0x80, 0x11f, 0x3, "48a6ec1e9cee61dc3259a570866d5fb9d601a8e18c821a848c0d68288c93057161121224c50e7349e364fde5232a6580d11332c54b17a79af76520d2bd372e69fa94979f92fea70f8a9a24c901603436dea1c6d5cc6f464ed9ea9f62511bac190324dfed816ad011405665f34f6d"}], 0x158, 0x10}, 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x5}, &(0x7f0000000180)=0x8) [ 307.658903] kobject: 'tx-9' (00000000743583f8): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-9' [ 307.662949] ? prepare_bprm_creds+0x120/0x120 [ 307.662971] ? usercopy_warn+0x110/0x110 [ 307.673442] kobject: 'tx-10' (000000005484332f): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.676897] ? kmem_cache_alloc+0x58f/0x730 [ 307.676923] ? check_preemption_disabled+0x48/0x280 [ 307.680960] kobject: 'tx-10' (000000005484332f): kobject_uevent_env [ 307.685713] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 307.685735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.695203] kobject: 'tx-10' (000000005484332f): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-10' [ 307.699297] ? strncpy_from_user+0x411/0x5a0 [ 307.699317] ? digsig_verify+0x1530/0x1530 [ 307.703140] kobject: 'tx-11' (0000000070556e33): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.709381] ? kmem_cache_alloc+0x33a/0x730 [ 307.709402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.709424] __x64_sys_execveat+0xed/0x130 [ 307.714059] kobject: 'tx-11' (0000000070556e33): kobject_uevent_env [ 307.717956] do_syscall_64+0x1b9/0x820 [ 307.717971] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.717991] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.728404] kobject: 'tx-11' (0000000070556e33): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-11' [ 307.732357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.732396] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.736563] kobject: 'tx-12' (00000000f62b4667): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.740488] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.740503] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.740524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.750155] kobject: 'tx-12' (00000000f62b4667): kobject_uevent_env [ 307.754009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.754025] RIP: 0033:0x457569 [ 307.758334] kobject: 'tx-12' (00000000f62b4667): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-12' [ 307.764552] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.764561] RSP: 002b:00007f2381548c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 307.769352] kobject: 'tx-13' (0000000071b35ca6): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.774148] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 307.774156] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 307.774166] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 307.774195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23815496d4 [ 307.784820] kobject: 'tx-13' (0000000071b35ca6): kobject_uevent_env [ 307.789001] R13: 00000000004bdc9b R14: 00000000004cd038 R15: 00000000ffffffff [ 307.833936] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 307.842154] kobject: 'tx-13' (0000000071b35ca6): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-13' [ 307.845596] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 307.850144] kobject: 'tx-14' (000000001c12d7cc): kobject_add_internal: parent: 'queues', set: 'queues' [ 307.863887] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 307.869039] kobject: 'tx-14' (000000001c12d7cc): kobject_uevent_env [ 307.874052] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 307.881897] kobject: 'tx-14' (000000001c12d7cc): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-14' [ 308.111946] kobject: 'tx-15' (000000006b6bbcfc): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.112149] kobject: 'tx-15' (000000006b6bbcfc): kobject_uevent_env [ 308.128530] kobject: 'tx-15' (000000006b6bbcfc): fill_kobj_path: path = '/devices/virtual/net/bond82/queues/tx-15' 12:24:42 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) close(r2) 12:24:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1b0b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:43 executing program 4 (fault-call:2 fault-nth:43): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x6) 12:24:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r1, 0x7}, &(0x7f0000000040)=0x8) setsockopt(r0, 0x0, 0x7fffffff, &(0x7f0000000080)="727507d4f44b704dfe7631b5f7786001c64f589df2ac71757163bd52ab4ad0121e7846efd48a35f66b5e4f64a5530717c15222dc4749dfa0789769d4a3300603f7cc4b3aa6200a76590f644c31580ac186710b5cf7a6b2", 0x57) [ 308.168770] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 308.175267] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 308.206302] kobject: 'loop4' (0000000089902ec2): kobject_uevent_env [ 308.213912] kobject: 'loop4' (0000000089902ec2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 308.219862] FAULT_INJECTION: forcing a failure. [ 308.219862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.241493] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 308.249732] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 308.256785] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 308.273892] CPU: 0 PID: 11872 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 308.281315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.283036] kobject: 'loop5' (000000009a0a8346): kobject_uevent_env [ 308.290672] Call Trace: [ 308.290696] dump_stack+0x244/0x39d [ 308.290714] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.290730] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 308.290761] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 308.290783] should_fail.cold.4+0xa/0x17 [ 308.290803] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.301221] kobject: 'loop5' (000000009a0a8346): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 308.303421] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 308.303469] ? kasan_check_read+0x11/0x20 [ 308.303486] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.311202] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 308.313694] ? unwind_dump+0x190/0x190 [ 308.313717] ? is_bpf_text_address+0xd3/0x170 [ 308.313738] ? fs_reclaim_acquire+0x20/0x20 [ 308.320540] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 308.322548] ? lock_downgrade+0x900/0x900 [ 308.322565] ? lock_release+0xa00/0xa00 [ 308.322584] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.393489] ? __might_sleep+0x95/0x190 [ 308.397474] __alloc_pages_nodemask+0x366/0xea0 [ 308.401073] kobject: 'bond83' (0000000045c5bf13): kobject_add_internal: parent: 'net', set: 'devices' [ 308.402155] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.402175] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 308.402201] ? trace_hardirqs_on+0xbd/0x310 [ 308.419321] kobject: 'bond83' (0000000045c5bf13): kobject_uevent_env [ 308.421928] ? kasan_unpoison_shadow+0x35/0x50 [ 308.421945] ? kasan_kmalloc+0xc7/0xe0 [ 308.421965] ? kasan_unpoison_shadow+0x35/0x50 [ 308.426393] kobject: 'bond83' (0000000045c5bf13): fill_kobj_path: path = '/devices/virtual/net/bond83' [ 308.432789] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 308.432809] alloc_pages_current+0x173/0x350 [ 308.432829] __vmalloc_node_range+0x498/0x750 [ 308.432857] ? htab_map_alloc+0x29e/0x1190 [ 308.432872] __vmalloc_node_flags_caller+0x75/0x90 [ 308.432890] ? htab_map_alloc+0x29e/0x1190 [ 308.438241] kobject: 'queues' (00000000f28be3d0): kobject_add_internal: parent: 'bond83', set: '' [ 308.441367] bpf_map_area_alloc+0x6f/0x90 [ 308.441383] htab_map_alloc+0x29e/0x1190 [ 308.441410] htab_of_map_alloc+0x7d/0x100 [ 308.446115] kobject: 'queues' (00000000f28be3d0): kobject_uevent_env [ 308.455431] ? htab_map_alloc+0x1190/0x1190 [ 308.455443] map_create+0x3bd/0x1110 [ 308.455457] ? bpf_map_new_fd+0x70/0x70 [ 308.455471] ? __might_fault+0x12b/0x1e0 [ 308.455485] ? lock_downgrade+0x900/0x900 [ 308.455500] ? lock_release+0xa00/0xa00 [ 308.455511] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.455528] ? usercopy_warn+0x110/0x110 [ 308.455565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.476214] kobject: 'queues' (00000000f28be3d0): kobject_uevent_env: filter function caused the event to drop! [ 308.479187] __x64_sys_bpf+0x303/0x520 [ 308.479202] ? bpf_prog_get+0x20/0x20 [ 308.479228] do_syscall_64+0x1b9/0x820 12:24:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x2d) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000140)=""/178, 0xb2) 12:24:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000080)={r2, 0x1}) 12:24:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback, 0x9b}}}, &(0x7f0000000040)=0x6e4e96e39ad60dd6) [ 308.479258] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.479274] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.479293] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.486823] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 308.493047] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.493064] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.493080] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.493102] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.499921] kobject: 'rx-0' (00000000a18fb3b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.501298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.501310] RIP: 0033:0x457569 [ 308.501330] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.505543] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 308.511942] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 12:24:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={r1, 0x100000000, 0x5, [0x0, 0x5513, 0xffffffff, 0x3, 0xd50]}, 0x12) 12:24:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x80000001, 0x2, 0x2ea58d18cb5878c7, 0x8, 0x80000000, 0x8}, &(0x7f0000000080)=0x20) 12:24:43 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'eql\x00', {0x2, 0x4e21, @multicast1}}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 308.511957] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 308.511966] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 308.511973] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 308.511981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 308.511989] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 308.590942] kobject: 'rx-0' (00000000a18fb3b5): kobject_uevent_env [ 308.629502] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 308.663682] kobject: 'rx-0' (00000000a18fb3b5): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-0' [ 308.717267] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 308.736057] kobject: 'rx-1' (000000001c130231): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.748804] kobject: 'rx-1' (000000001c130231): kobject_uevent_env [ 308.755361] kobject: 'rx-1' (000000001c130231): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-1' [ 308.766318] kobject: 'rx-2' (00000000e7bf0075): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.775950] kobject: 'rx-2' (00000000e7bf0075): kobject_uevent_env [ 308.782805] kobject: 'rx-2' (00000000e7bf0075): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-2' [ 308.793347] kobject: 'rx-3' (00000000ec9db9c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.802868] kobject: 'rx-3' (00000000ec9db9c7): kobject_uevent_env [ 308.809259] kobject: 'rx-3' (00000000ec9db9c7): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-3' [ 308.819666] kobject: 'rx-4' (000000000ca0a64d): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.829153] kobject: 'rx-4' (000000000ca0a64d): kobject_uevent_env [ 308.835540] kobject: 'rx-4' (000000000ca0a64d): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-4' [ 308.845966] kobject: 'rx-5' (00000000885f51bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.855368] kobject: 'rx-5' (00000000885f51bc): kobject_uevent_env [ 308.861856] kobject: 'rx-5' (00000000885f51bc): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-5' [ 308.872335] kobject: 'rx-6' (00000000bd8c51f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.881784] kobject: 'rx-6' (00000000bd8c51f4): kobject_uevent_env [ 308.888146] kobject: 'rx-6' (00000000bd8c51f4): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-6' [ 308.898526] kobject: 'rx-7' (00000000fe05926c): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.907971] kobject: 'rx-7' (00000000fe05926c): kobject_uevent_env [ 308.914316] kobject: 'rx-7' (00000000fe05926c): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-7' [ 308.924766] kobject: 'rx-8' (00000000e13d5925): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.934175] kobject: 'rx-8' (00000000e13d5925): kobject_uevent_env [ 308.940548] kobject: 'rx-8' (00000000e13d5925): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-8' [ 308.950938] kobject: 'rx-9' (00000000f1b413b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.960412] kobject: 'rx-9' (00000000f1b413b5): kobject_uevent_env [ 308.966755] kobject: 'rx-9' (00000000f1b413b5): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-9' [ 308.977168] kobject: 'rx-10' (00000000cb889829): kobject_add_internal: parent: 'queues', set: 'queues' [ 308.986701] kobject: 'rx-10' (00000000cb889829): kobject_uevent_env [ 308.993166] kobject: 'rx-10' (00000000cb889829): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-10' [ 309.003808] kobject: 'rx-11' (000000009b35b3ba): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.013881] kobject: 'rx-11' (000000009b35b3ba): kobject_uevent_env 12:24:43 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) close(r2) 12:24:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) clone(0x10222200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000200)="6d6406410557", 0x800) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=@v2={0x0, 0x1, 0x8, 0x40, 0x50, "dc15ab08c76ec1dbc925d71bcbbb4fc0660c34e860474a39dbf11e39c8a9324f609dd4c9ea1d01ee755a7f024146cba56e8da98b30bca643e466dcda20b630cea58ac65875cec25be84caabe79cae744"}, 0x5a, 0x2) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x210, 0x0, 0x0, 0x0, 0xb8, 0xb8, 0x178, 0x178, 0x178, 0x178, 0x178, 0x3, &(0x7f0000000180), {[{{@ip={@multicast1, @broadcast, 0xffffffff, 0xff000000, 'vlan0\x00', 'veth1_to_bond\x00', {}, {0xff}, 0xef, 0x3, 0x40}, 0x0, 0x98, 0xb8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@empty, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xff000000, 'syzkaller1\x00', 'bpq0\x00', {0xff}, {}, 0x73, 0x2}, 0x0, 0x98, 0xc0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x2c33, 0x7}, {0x8, 0x5, 0x5}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) [ 309.020396] kobject: 'rx-11' (000000009b35b3ba): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-11' [ 309.031025] kobject: 'rx-12' (00000000a9cfaf83): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.037050] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 309.047465] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 309.079672] kobject: 'rx-12' (00000000a9cfaf83): kobject_uevent_env [ 309.083534] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 309.086267] kobject: 'rx-12' (00000000a9cfaf83): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-12' [ 309.101464] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.104402] kobject: 'rx-13' (000000008a6b3695): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.122836] kobject: 'rx-13' (000000008a6b3695): kobject_uevent_env [ 309.129348] kobject: 'rx-13' (000000008a6b3695): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-13' [ 309.139945] kobject: 'rx-14' (00000000bd1e2681): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.149466] kobject: 'rx-14' (00000000bd1e2681): kobject_uevent_env [ 309.155887] kobject: 'rx-14' (00000000bd1e2681): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-14' [ 309.166493] kobject: 'rx-15' (000000008b218330): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.176035] kobject: 'rx-15' (000000008b218330): kobject_uevent_env [ 309.182487] kobject: 'rx-15' (000000008b218330): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/rx-15' [ 309.193042] kobject: 'tx-0' (00000000d61d48ad): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.202613] kobject: 'tx-0' (00000000d61d48ad): kobject_uevent_env [ 309.208965] kobject: 'tx-0' (00000000d61d48ad): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-0' [ 309.219373] kobject: 'tx-1' (0000000026173c3a): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.228918] kobject: 'tx-1' (0000000026173c3a): kobject_uevent_env [ 309.235252] kobject: 'tx-1' (0000000026173c3a): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-1' [ 309.245707] kobject: 'tx-2' (000000006cb945bb): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.255256] kobject: 'tx-2' (000000006cb945bb): kobject_uevent_env [ 309.261764] kobject: 'tx-2' (000000006cb945bb): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-2' [ 309.272190] kobject: 'tx-3' (000000008fe78293): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.281707] kobject: 'tx-3' (000000008fe78293): kobject_uevent_env [ 309.288112] kobject: 'tx-3' (000000008fe78293): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-3' [ 309.298527] kobject: 'tx-4' (0000000012b0d7ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.308121] kobject: 'tx-4' (0000000012b0d7ea): kobject_uevent_env [ 309.314439] kobject: 'tx-4' (0000000012b0d7ea): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-4' [ 309.324858] kobject: 'tx-5' (00000000f3290c78): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.334336] kobject: 'tx-5' (00000000f3290c78): kobject_uevent_env [ 309.340761] kobject: 'tx-5' (00000000f3290c78): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-5' [ 309.351172] kobject: 'tx-6' (000000007a417c6a): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.360775] kobject: 'tx-6' (000000007a417c6a): kobject_uevent_env [ 309.367100] kobject: 'tx-6' (000000007a417c6a): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-6' [ 309.377506] kobject: 'tx-7' (000000001d6181b0): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.386958] kobject: 'tx-7' (000000001d6181b0): kobject_uevent_env [ 309.393329] kobject: 'tx-7' (000000001d6181b0): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-7' [ 309.403741] kobject: 'tx-8' (00000000adf1386b): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.413223] kobject: 'tx-8' (00000000adf1386b): kobject_uevent_env [ 309.419796] kobject: 'tx-8' (00000000adf1386b): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-8' [ 309.430232] kobject: 'tx-9' (00000000b02fcc3f): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.439734] kobject: 'tx-9' (00000000b02fcc3f): kobject_uevent_env [ 309.446069] kobject: 'tx-9' (00000000b02fcc3f): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-9' [ 309.456503] kobject: 'tx-10' (00000000496092e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.466087] kobject: 'tx-10' (00000000496092e9): kobject_uevent_env [ 309.472555] kobject: 'tx-10' (00000000496092e9): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-10' [ 309.483150] kobject: 'tx-11' (0000000066001d9a): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.492819] kobject: 'tx-11' (0000000066001d9a): kobject_uevent_env [ 309.499512] kobject: 'tx-11' (0000000066001d9a): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-11' [ 309.510115] kobject: 'tx-12' (000000001ade55a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.519676] kobject: 'tx-12' (000000001ade55a4): kobject_uevent_env [ 309.526089] kobject: 'tx-12' (000000001ade55a4): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-12' [ 309.536676] kobject: 'tx-13' (00000000002ebfe9): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.546256] kobject: 'tx-13' (00000000002ebfe9): kobject_uevent_env [ 309.552720] kobject: 'tx-13' (00000000002ebfe9): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-13' [ 309.563341] kobject: 'tx-14' (00000000fb703d09): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.572992] kobject: 'tx-14' (00000000fb703d09): kobject_uevent_env [ 309.579610] kobject: 'tx-14' (00000000fb703d09): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-14' [ 309.590274] kobject: 'tx-15' (000000003f657e51): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.599878] kobject: 'tx-15' (000000003f657e51): kobject_uevent_env [ 309.606291] kobject: 'tx-15' (000000003f657e51): fill_kobj_path: path = '/devices/virtual/net/bond83/queues/tx-15' 12:24:44 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) close(r2) 12:24:44 executing program 1: clone(0x8800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800008000000000000000000000321847a855225ef93f2000010f236317d210d3d123397949ec391c1b2eff7a759b87b52fdb57978c0782b0ab0dc3a18b3d50a762eee23d37749c0fe6d7ec0006d478fdd50ea5824ae32077d985c0babdc90687b2227f51f383f1b1e57527fe400fcccaded820ef7c3dc4bfa8a90ef18d65d4af48956fc72803f2280368ab8f87d826d0eb18d656dfeea1266557e09028e973c24d030ed32668cb0442b57b9a5fe8a56a616caa323fb770c31a0319f77843f5c534481a93856ffa4737e1cb5a1942e822d7eb326492977890905f01"], 0x2d) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x1, {{0x2, 0x4e22, @broadcast}}}, 0x88) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x4e5}, 0x28, 0x1) 12:24:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x7ffffffff000) 12:24:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x2a0b010000000000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:44 executing program 4 (fault-call:2 fault-nth:44): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xce, 0x80) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x8, 0xffffffffffffff50, 0x8002, 0x4, 0x20, 0x1000, 0x1f, 0x80, r1}, &(0x7f0000000080)=0x20) [ 309.631577] kobject: 'loop4' (0000000089902ec2): kobject_uevent_env [ 309.665844] kobject: 'loop4' (0000000089902ec2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 309.673763] FAULT_INJECTION: forcing a failure. [ 309.673763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.692863] kobject: 'loop5' (000000009a0a8346): kobject_uevent_env [ 309.707979] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 309.718913] CPU: 1 PID: 11951 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 309.723059] kobject: 'loop5' (000000009a0a8346): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 309.726299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.726306] Call Trace: [ 309.726339] dump_stack+0x244/0x39d [ 309.751304] ? dump_stack_print_info.cold.1+0x20/0x20 [ 309.756507] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 309.761536] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 309.766309] should_fail.cold.4+0xa/0x17 [ 309.767787] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 309.770384] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.770401] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 309.770422] ? kasan_check_read+0x11/0x20 [ 309.777227] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 309.781917] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 309.781932] ? unwind_dump+0x190/0x190 [ 309.781954] ? is_bpf_text_address+0xd3/0x170 [ 309.781972] ? fs_reclaim_acquire+0x20/0x20 [ 309.781992] ? lock_downgrade+0x900/0x900 [ 309.790488] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 309.791049] ? lock_release+0xa00/0xa00 12:24:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x600) 12:24:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x800) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x3ff}, 0x28}, 0x10) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000200000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:44 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) close(r2) [ 309.800594] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 309.805739] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.805769] ? __might_sleep+0x95/0x190 [ 309.805793] __alloc_pages_nodemask+0x366/0xea0 [ 309.814542] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 309.818483] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.818503] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 309.818519] ? kasan_check_read+0x11/0x20 [ 309.818532] ? do_raw_spin_unlock+0xa7/0x330 [ 309.818546] ? do_raw_spin_trylock+0x270/0x270 [ 309.818566] ? trace_hardirqs_on+0xbd/0x310 [ 309.825053] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 309.829102] ? kasan_unpoison_shadow+0x35/0x50 [ 309.829119] ? kasan_kmalloc+0xc7/0xe0 [ 309.829140] ? kasan_unpoison_shadow+0x35/0x50 [ 309.829156] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.829177] alloc_pages_current+0x173/0x350 [ 309.837736] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env 12:24:44 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) close(r2) [ 309.842584] __vmalloc_node_range+0x498/0x750 [ 309.842605] ? htab_map_alloc+0x29e/0x1190 [ 309.842623] __vmalloc_node_flags_caller+0x75/0x90 [ 309.851541] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 309.852032] ? htab_map_alloc+0x29e/0x1190 [ 309.889955] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 309.890866] bpf_map_area_alloc+0x6f/0x90 [ 309.890884] htab_map_alloc+0x29e/0x1190 [ 309.890908] htab_of_map_alloc+0x7d/0x100 [ 309.925961] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 309.929672] ? htab_map_alloc+0x1190/0x1190 [ 309.929686] map_create+0x3bd/0x1110 [ 309.929703] ? bpf_map_new_fd+0x70/0x70 [ 309.929719] ? __might_fault+0x12b/0x1e0 [ 309.929735] ? lock_downgrade+0x900/0x900 [ 309.929763] ? lock_release+0xa00/0xa00 [ 309.929777] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.929796] ? usercopy_warn+0x110/0x110 [ 309.929821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.969470] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env 12:24:44 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) accept4(r0, 0x0, &(0x7f0000000040), 0x0) [ 309.971686] __x64_sys_bpf+0x303/0x520 [ 309.971702] ? bpf_prog_get+0x20/0x20 [ 309.971732] do_syscall_64+0x1b9/0x820 [ 309.975983] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 309.985318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.985336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.985351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.985368] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.985388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.019168] kobject: 'bond84' (00000000cc94965f): kobject_add_internal: parent: 'net', set: 'devices' [ 310.024531] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.024551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.024570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.047672] kobject: 'bond84' (00000000cc94965f): kobject_uevent_env [ 310.051943] RIP: 0033:0x457569 [ 310.051959] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:24:44 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) 12:24:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x5, 0x3, [0x4, 0x47749c9d, 0x2]}, &(0x7f0000000100)=0xe) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 310.051968] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.051982] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 310.051997] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 310.094701] kobject: 'bond84' (00000000cc94965f): fill_kobj_path: path = '/devices/virtual/net/bond84' [ 310.096811] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 310.096821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 310.096830] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 12:24:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x400a01, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)) connect(r0, &(0x7f0000000000)=@ethernet={0x307, @broadcast}, 0x80) 12:24:45 executing program 1: clone(0x4000000010800001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003000000000000000000380000000000200401"], 0x2d) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0x2, @output={0x1000, 0x1, {0x2, 0x401}, 0x10000, 0x4}}) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000300)={0x8, 0x1, 'client1\x00', 0x4, "91bb3caef1918cb5", "648ea1c60c0264d6e23a77f2666d1df93ea2e5b986e336855a46a0023f58a3d3", 0x8, 0x5}) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000240)='\x00') [ 310.169410] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 310.211205] kobject: 'queues' (000000000d145227): kobject_add_internal: parent: 'bond84', set: '' [ 310.232229] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 310.243867] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 310.250697] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 310.261382] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 310.268191] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 310.270054] kobject: 'queues' (000000000d145227): kobject_uevent_env [ 310.278401] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 310.287481] kobject: 'queues' (000000000d145227): kobject_uevent_env: filter function caused the event to drop! [ 310.294366] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 310.312030] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 310.319538] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 310.329588] kobject: 'rx-0' (00000000ace4cd9e): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.362020] kobject: 'rx-0' (00000000ace4cd9e): kobject_uevent_env [ 310.368703] kobject: 'rx-0' (00000000ace4cd9e): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-0' [ 310.379980] kobject: 'rx-1' (0000000060caab7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.389762] kobject: 'rx-1' (0000000060caab7b): kobject_uevent_env [ 310.396082] kobject: 'rx-1' (0000000060caab7b): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-1' [ 310.406506] kobject: 'rx-2' (000000005a0f66dd): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.415911] kobject: 'rx-2' (000000005a0f66dd): kobject_uevent_env [ 310.422332] kobject: 'rx-2' (000000005a0f66dd): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-2' [ 310.432708] kobject: 'rx-3' (0000000052be0e94): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.442146] kobject: 'rx-3' (0000000052be0e94): kobject_uevent_env [ 310.448497] kobject: 'rx-3' (0000000052be0e94): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-3' [ 310.458969] kobject: 'rx-4' (00000000936d67b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.468411] kobject: 'rx-4' (00000000936d67b6): kobject_uevent_env [ 310.474731] kobject: 'rx-4' (00000000936d67b6): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-4' [ 310.485197] kobject: 'rx-5' (000000003b3876e2): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.494829] kobject: 'rx-5' (000000003b3876e2): kobject_uevent_env [ 310.501224] kobject: 'rx-5' (000000003b3876e2): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-5' [ 310.511686] kobject: 'rx-6' (00000000c178cf42): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.521141] kobject: 'rx-6' (00000000c178cf42): kobject_uevent_env [ 310.527524] kobject: 'rx-6' (00000000c178cf42): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-6' [ 310.537958] kobject: 'rx-7' (00000000b841e5fd): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.547393] kobject: 'rx-7' (00000000b841e5fd): kobject_uevent_env [ 310.553741] kobject: 'rx-7' (00000000b841e5fd): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-7' [ 310.564246] kobject: 'rx-8' (00000000d2f17f0e): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.573664] kobject: 'rx-8' (00000000d2f17f0e): kobject_uevent_env [ 310.580044] kobject: 'rx-8' (00000000d2f17f0e): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-8' [ 310.590506] kobject: 'rx-9' (0000000021316324): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.599949] kobject: 'rx-9' (0000000021316324): kobject_uevent_env [ 310.606285] kobject: 'rx-9' (0000000021316324): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-9' [ 310.616707] kobject: 'rx-10' (000000001ff08d27): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.626537] kobject: 'rx-10' (000000001ff08d27): kobject_uevent_env [ 310.633012] kobject: 'rx-10' (000000001ff08d27): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-10' [ 310.643652] kobject: 'rx-11' (00000000ba73479f): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.653192] kobject: 'rx-11' (00000000ba73479f): kobject_uevent_env [ 310.659658] kobject: 'rx-11' (00000000ba73479f): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-11' [ 310.670237] kobject: 'rx-12' (0000000001670600): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.679733] kobject: 'rx-12' (0000000001670600): kobject_uevent_env [ 310.686170] kobject: 'rx-12' (0000000001670600): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-12' [ 310.696775] kobject: 'rx-13' (00000000afbc95d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.706343] kobject: 'rx-13' (00000000afbc95d5): kobject_uevent_env [ 310.712842] kobject: 'rx-13' (00000000afbc95d5): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-13' [ 310.723387] kobject: 'rx-14' (000000007fb604fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.732908] kobject: 'rx-14' (000000007fb604fc): kobject_uevent_env [ 310.739346] kobject: 'rx-14' (000000007fb604fc): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-14' [ 310.750300] kobject: 'rx-15' (00000000d7d2f4b1): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.759831] kobject: 'rx-15' (00000000d7d2f4b1): kobject_uevent_env [ 310.766250] kobject: 'rx-15' (00000000d7d2f4b1): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/rx-15' [ 310.776913] kobject: 'tx-0' (00000000a9f11bc2): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.786486] kobject: 'tx-0' (00000000a9f11bc2): kobject_uevent_env [ 310.792882] kobject: 'tx-0' (00000000a9f11bc2): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-0' [ 310.803277] kobject: 'tx-1' (00000000718c92c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.812840] kobject: 'tx-1' (00000000718c92c7): kobject_uevent_env [ 310.819187] kobject: 'tx-1' (00000000718c92c7): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-1' [ 310.829599] kobject: 'tx-2' (00000000c82bcd88): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.839096] kobject: 'tx-2' (00000000c82bcd88): kobject_uevent_env [ 310.845442] kobject: 'tx-2' (00000000c82bcd88): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-2' [ 310.855859] kobject: 'tx-3' (000000006363f214): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.865500] kobject: 'tx-3' (000000006363f214): kobject_uevent_env [ 310.871895] kobject: 'tx-3' (000000006363f214): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-3' [ 310.882597] kobject: 'tx-4' (000000000828615b): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.892152] kobject: 'tx-4' (000000000828615b): kobject_uevent_env [ 310.898507] kobject: 'tx-4' (000000000828615b): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-4' [ 310.908938] kobject: 'tx-5' (00000000ab10dbc7): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.918460] kobject: 'tx-5' (00000000ab10dbc7): kobject_uevent_env [ 310.924790] kobject: 'tx-5' (00000000ab10dbc7): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-5' [ 310.935193] kobject: 'tx-6' (000000002b09637a): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.944665] kobject: 'tx-6' (000000002b09637a): kobject_uevent_env [ 310.951081] kobject: 'tx-6' (000000002b09637a): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-6' [ 310.961614] kobject: 'tx-7' (00000000a133aa05): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.971162] kobject: 'tx-7' (00000000a133aa05): kobject_uevent_env [ 310.977517] kobject: 'tx-7' (00000000a133aa05): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-7' [ 310.987928] kobject: 'tx-8' (0000000047aaa123): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.997429] kobject: 'tx-8' (0000000047aaa123): kobject_uevent_env [ 311.003760] kobject: 'tx-8' (0000000047aaa123): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-8' [ 311.014488] kobject: 'tx-9' (000000000ac67f50): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.024130] kobject: 'tx-9' (000000000ac67f50): kobject_uevent_env [ 311.030495] kobject: 'tx-9' (000000000ac67f50): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-9' [ 311.040907] kobject: 'tx-10' (000000001beb3b99): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.050511] kobject: 'tx-10' (000000001beb3b99): kobject_uevent_env [ 311.056917] kobject: 'tx-10' (000000001beb3b99): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-10' [ 311.067523] kobject: 'tx-11' (00000000244b30f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.077056] kobject: 'tx-11' (00000000244b30f7): kobject_uevent_env [ 311.083508] kobject: 'tx-11' (00000000244b30f7): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-11' [ 311.094115] kobject: 'tx-12' (00000000f23a9b35): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.103819] kobject: 'tx-12' (00000000f23a9b35): kobject_uevent_env [ 311.110268] kobject: 'tx-12' (00000000f23a9b35): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-12' [ 311.120925] kobject: 'tx-13' (000000004c1add1e): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.131721] kobject: 'tx-13' (000000004c1add1e): kobject_uevent_env [ 311.138505] kobject: 'tx-13' (000000004c1add1e): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-13' [ 311.149107] kobject: 'tx-14' (00000000a869f0f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.158698] kobject: 'tx-14' (00000000a869f0f4): kobject_uevent_env [ 311.165137] kobject: 'tx-14' (00000000a869f0f4): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-14' [ 311.175745] kobject: 'tx-15' (00000000cc7b68ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.185342] kobject: 'tx-15' (00000000cc7b68ac): kobject_uevent_env [ 311.191822] kobject: 'tx-15' (00000000cc7b68ac): fill_kobj_path: path = '/devices/virtual/net/bond84/queues/tx-15' 12:24:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xa0b0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:46 executing program 4 (fault-call:2 fault-nth:45): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 12:24:46 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)='X', 0x1, 0x0, 0x0, 0x0) 12:24:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x1500) 12:24:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0xe}, @local, r2}, 0xc) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xf56, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000000c0)={r4, 0x27, 0x7, [0x0, 0x8, 0x0, 0xffffffff, 0x3, 0x3, 0x0]}, &(0x7f0000000100)=0x16) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000400)={r4, 0xd1}, &(0x7f0000000440)=0x8) 12:24:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', r0}, 0xfffffe5a) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='rose0\x00') ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000140)={0xb7a, "c4e6e3500694551e9dcec62297e3fcfce6bb3c20f7618422e43c672719741653", 0x1, 0x1}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000100)='vcan0\x00', 0x4}) 12:24:46 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) [ 311.229256] kobject: 'loop4' (0000000089902ec2): kobject_uevent_env [ 311.235711] kobject: 'loop4' (0000000089902ec2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 311.260738] kobject: 'loop5' (000000009a0a8346): kobject_uevent_env [ 311.287104] kobject: 'loop5' (000000009a0a8346): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 311.299016] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 311.310267] FAULT_INJECTION: forcing a failure. [ 311.310267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.319436] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env 12:24:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800008000010005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0xf0ffffff7f0000) 12:24:46 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) 12:24:46 executing program 1: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f45080d93c0000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 311.342271] kobject: 'bond85' (0000000019ef8ed1): kobject_add_internal: parent: 'net', set: 'devices' [ 311.363627] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 311.373403] CPU: 1 PID: 12032 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 311.380789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.381883] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 311.390144] Call Trace: [ 311.390186] dump_stack+0x244/0x39d [ 311.390222] ? dump_stack_print_info.cold.1+0x20/0x20 [ 311.390248] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 311.398427] kobject: 'bond85' (0000000019ef8ed1): kobject_uevent_env [ 311.399220] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 311.402846] kobject: 'bond85' (0000000019ef8ed1): fill_kobj_path: path = '/devices/virtual/net/bond85' [ 311.408009] should_fail.cold.4+0xa/0x17 [ 311.408028] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.408046] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 311.414033] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 311.419529] ? kasan_check_read+0x11/0x20 [ 311.419544] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 311.419559] ? unwind_dump+0x190/0x190 [ 311.419579] ? is_bpf_text_address+0xd3/0x170 [ 311.429481] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 311.433790] ? fs_reclaim_acquire+0x20/0x20 [ 311.433814] ? lock_downgrade+0x900/0x900 [ 311.445704] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 311.447873] ? lock_release+0xa00/0xa00 [ 311.447890] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.447911] ? __might_sleep+0x95/0x190 [ 311.460140] kobject: 'queues' (00000000f1629484): kobject_add_internal: parent: 'bond85', set: '' [ 311.461501] __alloc_pages_nodemask+0x366/0xea0 [ 311.461518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.461537] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 311.466908] kobject: 'queues' (00000000f1629484): kobject_uevent_env [ 311.470676] ? kasan_check_read+0x11/0x20 [ 311.470690] ? do_raw_spin_unlock+0xa7/0x330 [ 311.470703] ? do_raw_spin_trylock+0x270/0x270 [ 311.470722] ? trace_hardirqs_on+0xbd/0x310 [ 311.476316] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 311.481609] ? kasan_unpoison_shadow+0x35/0x50 [ 311.481626] ? kasan_kmalloc+0xc7/0xe0 [ 311.481648] ? kasan_unpoison_shadow+0x35/0x50 [ 311.481669] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 311.486258] kobject: 'queues' (00000000f1629484): kobject_uevent_env: filter function caused the event to drop! [ 311.490117] alloc_pages_current+0x173/0x350 [ 311.490138] __vmalloc_node_range+0x498/0x750 [ 311.490164] ? htab_map_alloc+0x29e/0x1190 [ 311.499905] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 311.503557] __vmalloc_node_flags_caller+0x75/0x90 [ 311.503573] ? htab_map_alloc+0x29e/0x1190 [ 311.503590] bpf_map_area_alloc+0x6f/0x90 [ 311.509725] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 311.513009] htab_map_alloc+0x29e/0x1190 [ 311.513040] htab_of_map_alloc+0x7d/0x100 [ 311.522889] kobject: 'rx-0' (00000000469dbec6): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.527211] ? htab_map_alloc+0x1190/0x1190 [ 311.527224] map_create+0x3bd/0x1110 [ 311.527240] ? bpf_map_new_fd+0x70/0x70 [ 311.532919] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 311.537602] ? __might_fault+0x12b/0x1e0 [ 311.537619] ? lock_downgrade+0x900/0x900 [ 311.537636] ? lock_release+0xa00/0xa00 [ 311.537654] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.544738] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 311.548290] ? usercopy_warn+0x110/0x110 [ 311.548316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.548332] __x64_sys_bpf+0x303/0x520 [ 311.553675] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 311.557334] ? bpf_prog_get+0x20/0x20 [ 311.557359] do_syscall_64+0x1b9/0x820 [ 311.557374] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.557392] ? syscall_return_slowpath+0x5e0/0x5e0 12:24:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 311.573976] kobject: 'rx-0' (00000000469dbec6): kobject_uevent_env [ 311.576578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.612082] kobject: 'rx-0' (00000000469dbec6): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-0' [ 311.619458] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.619475] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.619492] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.619511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.641256] kobject: 'rx-1' (000000002fcb81c5): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.643241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.643253] RIP: 0033:0x457569 [ 311.643274] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.647840] kobject: 'rx-1' (000000002fcb81c5): kobject_uevent_env [ 311.656759] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 311.656775] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 311.656784] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 311.656799] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 311.661435] kobject: 'rx-1' (000000002fcb81c5): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-1' [ 311.664812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 311.664821] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 311.742932] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 311.801643] kobject: 'rx-2' (000000007ae124f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.814847] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 311.825650] kobject: 'rx-2' (000000007ae124f3): kobject_uevent_env [ 311.830008] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 311.841291] kobject: 'rx-2' (000000007ae124f3): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-2' [ 311.843966] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 311.862009] kobject: 'rx-3' (0000000091b700cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.950456] kobject: 'rx-3' (0000000091b700cf): kobject_uevent_env [ 311.956803] kobject: 'rx-3' (0000000091b700cf): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-3' [ 311.967236] kobject: 'rx-4' (0000000085790863): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.976717] kobject: 'rx-4' (0000000085790863): kobject_uevent_env [ 311.983180] kobject: 'rx-4' (0000000085790863): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-4' [ 311.993630] kobject: 'rx-5' (00000000e293e0db): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.003366] kobject: 'rx-5' (00000000e293e0db): kobject_uevent_env [ 312.009767] kobject: 'rx-5' (00000000e293e0db): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-5' [ 312.020145] kobject: 'rx-6' (000000001f9768f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.029590] kobject: 'rx-6' (000000001f9768f9): kobject_uevent_env [ 312.035939] kobject: 'rx-6' (000000001f9768f9): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-6' [ 312.046380] kobject: 'rx-7' (0000000006fd2f1a): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.055873] kobject: 'rx-7' (0000000006fd2f1a): kobject_uevent_env [ 312.062243] kobject: 'rx-7' (0000000006fd2f1a): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-7' [ 312.072688] kobject: 'rx-8' (00000000785af573): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.082137] kobject: 'rx-8' (00000000785af573): kobject_uevent_env [ 312.088646] kobject: 'rx-8' (00000000785af573): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-8' [ 312.099242] kobject: 'rx-9' (00000000dd0bf088): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.108712] kobject: 'rx-9' (00000000dd0bf088): kobject_uevent_env [ 312.115032] kobject: 'rx-9' (00000000dd0bf088): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-9' [ 312.125442] kobject: 'rx-10' (00000000b0b77283): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.134943] kobject: 'rx-10' (00000000b0b77283): kobject_uevent_env [ 312.141411] kobject: 'rx-10' (00000000b0b77283): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-10' [ 312.152001] kobject: 'rx-11' (000000003f8a5f47): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.161595] kobject: 'rx-11' (000000003f8a5f47): kobject_uevent_env [ 312.168035] kobject: 'rx-11' (000000003f8a5f47): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-11' [ 312.178633] kobject: 'rx-12' (000000000a1cfadd): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.188134] kobject: 'rx-12' (000000000a1cfadd): kobject_uevent_env [ 312.194552] kobject: 'rx-12' (000000000a1cfadd): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-12' [ 312.205145] kobject: 'rx-13' (00000000e0f814a2): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.214666] kobject: 'rx-13' (00000000e0f814a2): kobject_uevent_env [ 312.221120] kobject: 'rx-13' (00000000e0f814a2): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-13' [ 312.231720] kobject: 'rx-14' (00000000de54121d): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.241280] kobject: 'rx-14' (00000000de54121d): kobject_uevent_env [ 312.247729] kobject: 'rx-14' (00000000de54121d): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-14' [ 312.258324] kobject: 'rx-15' (000000001b515504): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.267856] kobject: 'rx-15' (000000001b515504): kobject_uevent_env [ 312.274262] kobject: 'rx-15' (000000001b515504): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/rx-15' [ 312.284856] kobject: 'tx-0' (00000000496a64de): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.294334] kobject: 'tx-0' (00000000496a64de): kobject_uevent_env [ 312.300872] kobject: 'tx-0' (00000000496a64de): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-0' [ 312.311317] kobject: 'tx-1' (000000006dcd35c0): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.321447] kobject: 'tx-1' (000000006dcd35c0): kobject_uevent_env [ 312.327877] kobject: 'tx-1' (000000006dcd35c0): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-1' [ 312.338260] kobject: 'tx-2' (000000008c982e9a): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.347844] kobject: 'tx-2' (000000008c982e9a): kobject_uevent_env [ 312.354173] kobject: 'tx-2' (000000008c982e9a): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-2' [ 312.364589] kobject: 'tx-3' (000000007c5dd7be): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.374060] kobject: 'tx-3' (000000007c5dd7be): kobject_uevent_env [ 312.380421] kobject: 'tx-3' (000000007c5dd7be): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-3' [ 312.390863] kobject: 'tx-4' (000000002b52ea17): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.400432] kobject: 'tx-4' (000000002b52ea17): kobject_uevent_env [ 312.406882] kobject: 'tx-4' (000000002b52ea17): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-4' [ 312.417338] kobject: 'tx-5' (00000000561debf1): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.426840] kobject: 'tx-5' (00000000561debf1): kobject_uevent_env [ 312.433257] kobject: 'tx-5' (00000000561debf1): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-5' [ 312.443688] kobject: 'tx-6' (00000000c0489fe8): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.453283] kobject: 'tx-6' (00000000c0489fe8): kobject_uevent_env [ 312.459668] kobject: 'tx-6' (00000000c0489fe8): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-6' [ 312.470113] kobject: 'tx-7' (00000000d39073c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.479583] kobject: 'tx-7' (00000000d39073c7): kobject_uevent_env [ 312.485909] kobject: 'tx-7' (00000000d39073c7): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-7' [ 312.496318] kobject: 'tx-8' (000000009fdb10b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.505812] kobject: 'tx-8' (000000009fdb10b6): kobject_uevent_env [ 312.512178] kobject: 'tx-8' (000000009fdb10b6): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-8' [ 312.522558] kobject: 'tx-9' (000000000cc7da30): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.532107] kobject: 'tx-9' (000000000cc7da30): kobject_uevent_env [ 312.538469] kobject: 'tx-9' (000000000cc7da30): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-9' [ 312.548894] kobject: 'tx-10' (000000006606e96d): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.558604] kobject: 'tx-10' (000000006606e96d): kobject_uevent_env [ 312.565010] kobject: 'tx-10' (000000006606e96d): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-10' [ 312.575605] kobject: 'tx-11' (00000000cefc4896): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.585165] kobject: 'tx-11' (00000000cefc4896): kobject_uevent_env [ 312.591637] kobject: 'tx-11' (00000000cefc4896): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-11' [ 312.602191] kobject: 'tx-12' (000000008fe43d04): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.611874] kobject: 'tx-12' (000000008fe43d04): kobject_uevent_env [ 312.618305] kobject: 'tx-12' (000000008fe43d04): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-12' [ 312.628894] kobject: 'tx-13' (00000000cc5125fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.638440] kobject: 'tx-13' (00000000cc5125fb): kobject_uevent_env [ 312.644845] kobject: 'tx-13' (00000000cc5125fb): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-13' [ 312.655436] kobject: 'tx-14' (00000000483621e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.664991] kobject: 'tx-14' (00000000483621e9): kobject_uevent_env [ 312.671436] kobject: 'tx-14' (00000000483621e9): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-14' [ 312.681982] kobject: 'tx-15' (00000000ff714ce8): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.691613] kobject: 'tx-15' (00000000ff714ce8): kobject_uevent_env 12:24:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x220b0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, 0x1c91}}, 0x0, 0x5, 0x400, 0x5, 0x3}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000440)="685f1404a3c1594b8c7d405ba0e45ea99a03f03b2a45", 0x16}, {&(0x7f0000000480)="b0ab41fe73b547300c760bfe82d022e8b8b89a0145e4704d287e0256b138483580255ede77ac128b939cc0d65781efa251cbda51ca938f098952c3118e432319fe1c556c2a13e19bb3292be9dbaca029a2d6fc173b380dc41d5278f51abac86b5aac423e5dad02294ff301d288428d0198abf03a27578de9eb5bc19e1080392205d5d15f29389c7af44d28959154f851480a92a5d8558e1e51030ff823a6732c0e9378d2141c7cb7df7df75bfff846f266c5f696", 0xb4}, {&(0x7f0000000540)="eb6e0710518e87501485f307ef2bdf387da8e0f4c88663781574ad85aa4daefff86b0c6367bcc6587ac8312a", 0x2c}], 0x3, &(0x7f00000005c0)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}], 0x30, 0x10}, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x40000) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x101, 0x10000) getsockname(r1, &(0x7f0000000100)=@hci, &(0x7f0000000180)=0x80) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000280)=0x1) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300031c4e00b9122e0b723d24a83b040000009f0000001b1dda2f9464219f67baba7c6b74628ed0c7e3c50822707d8b77e48a5c8c9b42cdc11964b78aecb9a17b7741ba80c88df870b2fcef11336166a5128e0692e98cabfeac510057de1066f50269a977bdb01accff0b9905c26624f5c850220d80dd7a"], 0xfea2) accept4$alg(r1, 0x0, 0x0, 0x80800) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f00000003c0)={r3, &(0x7f0000000340)=""/86}) 12:24:47 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 12:24:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x15000000000000) 12:24:47 executing program 4 (fault-call:2 fault-nth:46): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 312.698051] kobject: 'tx-15' (00000000ff714ce8): fill_kobj_path: path = '/devices/virtual/net/bond85/queues/tx-15' [ 312.724443] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 312.732796] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 312.768590] FAULT_INJECTION: forcing a failure. [ 312.768590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.776410] kobject: 'loop4' (0000000089902ec2): kobject_uevent_env [ 312.786651] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 312.793472] kobject: 'loop4' (0000000089902ec2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 312.808814] CPU: 0 PID: 12083 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 312.816190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.820531] kobject: 'loop5' (000000009a0a8346): kobject_uevent_env [ 312.825544] Call Trace: [ 312.825585] dump_stack+0x244/0x39d [ 312.825610] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.843420] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 312.845583] kobject: 'loop5' (000000009a0a8346): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 312.848449] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 312.848470] should_fail.cold.4+0xa/0x17 [ 312.848493] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.871851] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.876837] ? kasan_check_read+0x11/0x20 [ 312.880671] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 312.880994] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.881011] ? unwind_dump+0x190/0x190 [ 312.881031] ? is_bpf_text_address+0xd3/0x170 [ 312.900995] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 312.901054] ? fs_reclaim_acquire+0x20/0x20 [ 312.914804] ? lock_downgrade+0x900/0x900 [ 312.918970] ? lock_release+0xa00/0xa00 [ 312.922956] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.926474] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 312.928439] ? __might_sleep+0x95/0x190 [ 312.928458] __alloc_pages_nodemask+0x366/0xea0 [ 312.928473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.928492] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 312.945408] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 312.948863] ? kasan_check_read+0x11/0x20 [ 312.948878] ? do_raw_spin_unlock+0xa7/0x330 [ 312.948892] ? do_raw_spin_trylock+0x270/0x270 [ 312.948909] ? trace_hardirqs_on+0xbd/0x310 [ 312.948930] ? kasan_unpoison_shadow+0x35/0x50 [ 312.964362] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 312.968004] ? kasan_kmalloc+0xc7/0xe0 [ 312.968026] ? kasan_unpoison_shadow+0x35/0x50 [ 312.968043] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 312.968065] alloc_pages_current+0x173/0x350 [ 312.980437] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 312.981368] __vmalloc_node_range+0x498/0x750 [ 313.024640] ? htab_map_alloc+0x29e/0x1190 [ 313.028886] __vmalloc_node_flags_caller+0x75/0x90 [ 313.033825] ? htab_map_alloc+0x29e/0x1190 [ 313.038083] bpf_map_area_alloc+0x6f/0x90 [ 313.042243] htab_map_alloc+0x29e/0x1190 [ 313.046325] htab_of_map_alloc+0x7d/0x100 [ 313.050494] ? htab_map_alloc+0x1190/0x1190 [ 313.054822] map_create+0x3bd/0x1110 [ 313.059272] ? bpf_map_new_fd+0x70/0x70 [ 313.063256] ? __might_fault+0x12b/0x1e0 [ 313.067326] ? lock_downgrade+0x900/0x900 [ 313.071486] ? lock_release+0xa00/0xa00 [ 313.075480] ? perf_trace_sched_process_exec+0x860/0x860 [ 313.080944] ? usercopy_warn+0x110/0x110 [ 313.083409] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 313.085027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 313.094876] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 313.096954] __x64_sys_bpf+0x303/0x520 [ 313.096969] ? bpf_prog_get+0x20/0x20 [ 313.096996] do_syscall_64+0x1b9/0x820 [ 313.117966] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.123359] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.128302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.133158] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.138185] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.143246] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.148271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.153128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.158321] RIP: 0033:0x457569 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400800, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x800) 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x2, @mcast1, 0x7}}}, &(0x7f00000002c0)=0x84) 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x20, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r1, &(0x7f0000000340)="c6c89bd02cc70a553b1df8f3dc7a5f893939c9579f82ae300d5ccdd0252b1590bfb9ede54c4dd39ed5a098351f7cf5bfd2dfe599859daf2a1b28f68bb49ffe", &(0x7f0000000380)=""/203}, 0x18) r2 = dup2(r0, r0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x20002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) bind$bt_hci(r2, &(0x7f0000000580)={0x1f, r3}, 0xfffffffffffffeb1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000000)=0x84) 12:24:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xda, 0x51, &(0x7f0000000000)="5d7c7e291a94cf5f2ad45de050026d34e66b9c8dbfc1c309cd139875bf973f600d3eeffcac656ac79bef583fb07e8136c4da0e1be860b56e3828895a55b1c6936fa72e679c77ff423395c70b02ff490b49a4377520a24493c9c9f3a29d95eeb7eb1c03dc2fd65b690f0bfaf18baf3943b13b14b5bdf11d53ebb70c986c1689227468783c352339adf1ba853231d47df4c1ff63406e97dc0508b5f53597ca7367a0a8f92c013ea28a82f62f1ab5dfeb1744489047d7868c75f11a246b89f0431a208691e51ad9846521473528f70c290c0e3dd80075a08d251c3b", &(0x7f0000000100)=""/81, 0x3603747b}, 0x28) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 313.161524] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.176464] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 313.180426] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 313.180441] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 313.180451] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 313.180460] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 313.180468] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 313.180477] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 313.205794] kobject: 'bond86' (00000000865f69e5): kobject_add_internal: parent: 'net', set: 'devices' [ 313.210041] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 313.218651] kobject: 'bond86' (00000000865f69e5): kobject_uevent_env [ 313.228059] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 313.231715] kobject: 'bond86' (00000000865f69e5): fill_kobj_path: path = '/devices/virtual/net/bond86' [ 313.253409] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 313.259596] kobject: 'queues' (00000000988c264a): kobject_add_internal: parent: 'bond86', set: '' [ 313.263663] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 313.273108] kobject: 'queues' (00000000988c264a): kobject_uevent_env [ 313.282348] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 313.314390] kobject: 'queues' (00000000988c264a): kobject_uevent_env: filter function caused the event to drop! [ 313.324680] kobject: 'rx-0' (00000000cb829e7e): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.334109] kobject: 'rx-0' (00000000cb829e7e): kobject_uevent_env [ 313.340522] kobject: 'rx-0' (00000000cb829e7e): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-0' [ 313.350939] kobject: 'rx-1' (000000005eece00b): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.360410] kobject: 'rx-1' (000000005eece00b): kobject_uevent_env [ 313.366735] kobject: 'rx-1' (000000005eece00b): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-1' [ 313.377163] kobject: 'rx-2' (00000000331682f1): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.386610] kobject: 'rx-2' (00000000331682f1): kobject_uevent_env [ 313.392997] kobject: 'rx-2' (00000000331682f1): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-2' [ 313.403423] kobject: 'rx-3' (00000000c34f7a4d): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.412899] kobject: 'rx-3' (00000000c34f7a4d): kobject_uevent_env [ 313.419266] kobject: 'rx-3' (00000000c34f7a4d): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-3' [ 313.429682] kobject: 'rx-4' (00000000692c5fe4): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.439093] kobject: 'rx-4' (00000000692c5fe4): kobject_uevent_env [ 313.445410] kobject: 'rx-4' (00000000692c5fe4): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-4' [ 313.455878] kobject: 'rx-5' (000000008c1fb7b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.465314] kobject: 'rx-5' (000000008c1fb7b8): kobject_uevent_env [ 313.471678] kobject: 'rx-5' (000000008c1fb7b8): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-5' [ 313.482077] kobject: 'rx-6' (000000001b8cc7b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.491523] kobject: 'rx-6' (000000001b8cc7b2): kobject_uevent_env [ 313.497996] kobject: 'rx-6' (000000001b8cc7b2): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-6' [ 313.508522] kobject: 'rx-7' (000000000b6f3c47): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.517944] kobject: 'rx-7' (000000000b6f3c47): kobject_uevent_env [ 313.524299] kobject: 'rx-7' (000000000b6f3c47): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-7' [ 313.534725] kobject: 'rx-8' (00000000522ff29b): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.544182] kobject: 'rx-8' (00000000522ff29b): kobject_uevent_env [ 313.550556] kobject: 'rx-8' (00000000522ff29b): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-8' [ 313.561366] kobject: 'rx-9' (00000000f1887290): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.570846] kobject: 'rx-9' (00000000f1887290): kobject_uevent_env [ 313.577207] kobject: 'rx-9' (00000000f1887290): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-9' [ 313.587633] kobject: 'rx-10' (00000000fc259c7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.597107] kobject: 'rx-10' (00000000fc259c7b): kobject_uevent_env [ 313.603562] kobject: 'rx-10' (00000000fc259c7b): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-10' [ 313.614147] kobject: 'rx-11' (00000000236fc120): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.623681] kobject: 'rx-11' (00000000236fc120): kobject_uevent_env [ 313.630142] kobject: 'rx-11' (00000000236fc120): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-11' [ 313.640740] kobject: 'rx-12' (00000000799505eb): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.650304] kobject: 'rx-12' (00000000799505eb): kobject_uevent_env [ 313.656733] kobject: 'rx-12' (00000000799505eb): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-12' [ 313.667373] kobject: 'rx-13' (00000000cb5b3ac6): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.676849] kobject: 'rx-13' (00000000cb5b3ac6): kobject_uevent_env [ 313.683390] kobject: 'rx-13' (00000000cb5b3ac6): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-13' [ 313.693993] kobject: 'rx-14' (000000004972a135): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.703522] kobject: 'rx-14' (000000004972a135): kobject_uevent_env [ 313.709998] kobject: 'rx-14' (000000004972a135): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-14' [ 313.720563] kobject: 'rx-15' (00000000465207b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.730083] kobject: 'rx-15' (00000000465207b7): kobject_uevent_env [ 313.736503] kobject: 'rx-15' (00000000465207b7): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/rx-15' [ 313.747100] kobject: 'tx-0' (00000000feb7470c): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.756686] kobject: 'tx-0' (00000000feb7470c): kobject_uevent_env [ 313.763042] kobject: 'tx-0' (00000000feb7470c): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-0' [ 313.773452] kobject: 'tx-1' (00000000c7528185): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.782929] kobject: 'tx-1' (00000000c7528185): kobject_uevent_env [ 313.789298] kobject: 'tx-1' (00000000c7528185): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-1' [ 313.799699] kobject: 'tx-2' (00000000a414640f): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.809320] kobject: 'tx-2' (00000000a414640f): kobject_uevent_env [ 313.815652] kobject: 'tx-2' (00000000a414640f): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-2' [ 313.826064] kobject: 'tx-3' (0000000020e7fc17): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.835573] kobject: 'tx-3' (0000000020e7fc17): kobject_uevent_env [ 313.841988] kobject: 'tx-3' (0000000020e7fc17): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-3' [ 313.852405] kobject: 'tx-4' (000000008db33bd2): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.861879] kobject: 'tx-4' (000000008db33bd2): kobject_uevent_env [ 313.868256] kobject: 'tx-4' (000000008db33bd2): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-4' [ 313.878639] kobject: 'tx-5' (000000003b7a5f81): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.888189] kobject: 'tx-5' (000000003b7a5f81): kobject_uevent_env [ 313.894568] kobject: 'tx-5' (000000003b7a5f81): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-5' [ 313.904975] kobject: 'tx-6' (00000000fb858875): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.914498] kobject: 'tx-6' (00000000fb858875): kobject_uevent_env [ 313.920871] kobject: 'tx-6' (00000000fb858875): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-6' [ 313.931292] kobject: 'tx-7' (000000007a304aa7): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.940907] kobject: 'tx-7' (000000007a304aa7): kobject_uevent_env [ 313.947229] kobject: 'tx-7' (000000007a304aa7): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-7' [ 313.957659] kobject: 'tx-8' (00000000d807abc8): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.967134] kobject: 'tx-8' (00000000d807abc8): kobject_uevent_env [ 313.973519] kobject: 'tx-8' (00000000d807abc8): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-8' [ 313.983927] kobject: 'tx-9' (00000000bf60d8ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.993497] kobject: 'tx-9' (00000000bf60d8ac): kobject_uevent_env [ 313.999844] kobject: 'tx-9' (00000000bf60d8ac): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-9' [ 314.010253] kobject: 'tx-10' (000000007750b038): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.019874] kobject: 'tx-10' (000000007750b038): kobject_uevent_env [ 314.026298] kobject: 'tx-10' (000000007750b038): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-10' [ 314.036899] kobject: 'tx-11' (000000004e1988b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.046463] kobject: 'tx-11' (000000004e1988b2): kobject_uevent_env [ 314.052917] kobject: 'tx-11' (000000004e1988b2): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-11' [ 314.063523] kobject: 'tx-12' (0000000048aa4ced): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.073163] kobject: 'tx-12' (0000000048aa4ced): kobject_uevent_env [ 314.079615] kobject: 'tx-12' (0000000048aa4ced): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-12' [ 314.090203] kobject: 'tx-13' (000000003524d476): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.099774] kobject: 'tx-13' (000000003524d476): kobject_uevent_env [ 314.106184] kobject: 'tx-13' (000000003524d476): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-13' [ 314.116780] kobject: 'tx-14' (00000000f97080fe): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.126427] kobject: 'tx-14' (00000000f97080fe): kobject_uevent_env [ 314.132888] kobject: 'tx-14' (00000000f97080fe): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-14' [ 314.143479] kobject: 'tx-15' (0000000081b16442): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.153147] kobject: 'tx-15' (0000000081b16442): kobject_uevent_env [ 314.159593] kobject: 'tx-15' (0000000081b16442): fill_kobj_path: path = '/devices/virtual/net/bond86/queues/tx-15' 12:24:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10b17, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x100) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0xffffffffffffffc0}, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:49 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 12:24:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x600000000000000) 12:24:49 executing program 4 (fault-call:2 fault-nth:47): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 314.188433] kobject: 'loop4' (0000000089902ec2): kobject_uevent_env [ 314.194882] kobject: 'loop4' (0000000089902ec2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 314.221074] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 314.232834] FAULT_INJECTION: forcing a failure. [ 314.232834] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.250167] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 314.264458] CPU: 1 PID: 12125 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 314.270449] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 314.271846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:24:49 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 12:24:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x44000000) 12:24:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x420000, 0x0) getpeername$llc(r1, &(0x7f0000000040), &(0x7f0000000080)=0x10) [ 314.271853] Call Trace: [ 314.271889] dump_stack+0x244/0x39d [ 314.294776] ? dump_stack_print_info.cold.1+0x20/0x20 [ 314.299987] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 314.305014] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 314.308075] kobject: 'loop5' (000000009a0a8346): kobject_uevent_env [ 314.309787] should_fail.cold.4+0xa/0x17 [ 314.309807] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.325347] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 314.330332] ? kasan_check_read+0x11/0x20 12:24:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sync_file_range(r0, 0x1, 0x2, 0x6) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f4584ebe00000000000000000fc0300030000000000000000003800000000000000000000000000200001800000000000000000000000000000"], 0x2d) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000080)='\x00', &(0x7f0000000100)='\x00'], &(0x7f0000000340)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='cgroupeth1\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='[security\x00', &(0x7f0000000300)='\x00']) [ 314.332502] kobject: 'loop5' (000000009a0a8346): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 314.334504] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 314.334521] ? unwind_dump+0x190/0x190 [ 314.334542] ? is_bpf_text_address+0xd3/0x170 [ 314.334561] ? fs_reclaim_acquire+0x20/0x20 [ 314.361930] ? lock_downgrade+0x900/0x900 [ 314.362248] kobject: 'loop3' (0000000079fcc12e): kobject_uevent_env [ 314.366088] ? lock_release+0xa00/0xa00 [ 314.366104] ? perf_trace_sched_process_exec+0x860/0x860 [ 314.366124] ? __might_sleep+0x95/0x190 [ 314.366144] __alloc_pages_nodemask+0x366/0xea0 [ 314.390571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.395946] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 314.398343] kobject: 'loop3' (0000000079fcc12e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 314.400979] ? trace_hardirqs_on+0xbd/0x310 [ 314.401001] ? kasan_unpoison_shadow+0x35/0x50 [ 314.401020] ? kasan_kmalloc+0xc7/0xe0 [ 314.423230] ? kasan_unpoison_shadow+0x35/0x50 [ 314.427831] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 314.433382] alloc_pages_current+0x173/0x350 12:24:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = geteuid() getgroups(0x3, &(0x7f0000000040)=[0x0, 0x0, 0xee00]) chown(&(0x7f0000000000)='./file0\x00', r1, r2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) [ 314.436639] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 314.437808] __vmalloc_node_range+0x498/0x750 [ 314.437831] ? htab_map_alloc+0x29e/0x1190 [ 314.437848] __vmalloc_node_flags_caller+0x75/0x90 [ 314.437863] ? htab_map_alloc+0x29e/0x1190 [ 314.437881] bpf_map_area_alloc+0x6f/0x90 [ 314.453191] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 314.457917] htab_map_alloc+0x29e/0x1190 [ 314.457944] htab_of_map_alloc+0x7d/0x100 [ 314.457959] ? htab_map_alloc+0x1190/0x1190 [ 314.457971] map_create+0x3bd/0x1110 [ 314.457987] ? bpf_map_new_fd+0x70/0x70 [ 314.458007] ? __might_fault+0x12b/0x1e0 [ 314.468943] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 314.475803] ? lock_downgrade+0x900/0x900 [ 314.475822] ? lock_release+0xa00/0xa00 [ 314.475837] ? perf_trace_sched_process_exec+0x860/0x860 [ 314.475858] ? usercopy_warn+0x110/0x110 [ 314.480096] kobject: 'bond87' (00000000c9ce633c): kobject_add_internal: parent: 'net', set: 'devices' [ 314.484054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:24:49 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e22, 0x17, @empty, 0xffffffffffffffff}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e20, 0x2d4a8091, @ipv4={[], [], @remote}, 0xc12}, @in6={0xa, 0x4e24, 0x72cb, @empty, 0xa9}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e21, 0x1, @mcast2}], 0xc0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000080)={0x1, 0x1, [{0x1, 0x0, 0x9}]}) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 314.484071] __x64_sys_bpf+0x303/0x520 [ 314.497109] kobject: 'bond87' (00000000c9ce633c): kobject_uevent_env [ 314.500104] ? bpf_prog_get+0x20/0x20 [ 314.500132] do_syscall_64+0x1b9/0x820 [ 314.500148] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.500165] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.500180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.500215] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.512031] kobject: 'bond87' (00000000c9ce633c): fill_kobj_path: path = '/devices/virtual/net/bond87' [ 314.514773] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.514792] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.514811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.514834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.514850] RIP: 0033:0x457569 [ 314.527148] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 314.533687] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.533696] RSP: 002b:00007f80a0aefc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 314.533710] RAX: ffffffffffffffda RBX: 00007f80a0aefc90 RCX: 0000000000457569 [ 314.533720] RDX: 000000000000002c RSI: 0000000020000400 RDI: ffffffff00000000 [ 314.533729] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.533737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80a0af06d4 [ 314.533746] R13: 00000000004bd99a R14: 00000000004cca98 R15: 0000000000000005 [ 314.535019] kobject: 'queues' (0000000061de014f): kobject_add_internal: parent: 'bond87', set: '' [ 314.569858] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 314.586115] kobject: 'queues' (0000000061de014f): kobject_uevent_env [ 314.622671] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 314.650558] kobject: 'queues' (0000000061de014f): kobject_uevent_env: filter function caused the event to drop! [ 314.660263] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 314.661609] kobject: 'rx-0' (000000001febba01): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.680635] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 314.683829] kobject: 'rx-0' (000000001febba01): kobject_uevent_env [ 314.697665] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 314.699529] kobject: 'rx-0' (000000001febba01): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-0' [ 314.706857] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 314.716597] kobject: 'rx-1' (00000000882206fe): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.733633] kobject: 'loop1' (000000004e3921b6): kobject_uevent_env [ 314.741694] kobject: 'rx-1' (00000000882206fe): kobject_uevent_env [ 314.761229] kobject: 'loop1' (000000004e3921b6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 314.765071] kobject: 'rx-1' (00000000882206fe): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-1' [ 314.774781] kobject: 'loop0' (000000002afdf305): kobject_uevent_env [ 314.783906] kobject: 'rx-2' (00000000f3817686): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.793482] kobject: 'loop0' (000000002afdf305): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 314.800882] kobject: 'rx-2' (00000000f3817686): kobject_uevent_env [ 314.860980] kobject: 'rx-2' (00000000f3817686): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-2' [ 314.871464] kobject: 'rx-3' (000000005b5934c1): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.880979] kobject: 'rx-3' (000000005b5934c1): kobject_uevent_env [ 314.896141] kobject: 'rx-3' (000000005b5934c1): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-3' [ 314.907443] kobject: 'rx-4' (00000000d692d505): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.917328] kobject: 'rx-4' (00000000d692d505): kobject_uevent_env [ 314.924562] kobject: 'rx-4' (00000000d692d505): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-4' [ 314.935137] kobject: 'rx-5' (000000006a1bc735): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.944738] kobject: 'rx-5' (000000006a1bc735): kobject_uevent_env [ 314.951123] kobject: 'rx-5' (000000006a1bc735): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-5' [ 314.961707] kobject: 'rx-6' (0000000012ca75f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.971151] kobject: 'rx-6' (0000000012ca75f0): kobject_uevent_env [ 314.977535] kobject: 'rx-6' (0000000012ca75f0): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-6' [ 314.987952] kobject: 'rx-7' (000000006fca9d9a): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.997396] kobject: 'rx-7' (000000006fca9d9a): kobject_uevent_env [ 315.003717] kobject: 'rx-7' (000000006fca9d9a): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-7' [ 315.014121] kobject: 'rx-8' (00000000fad371c5): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.023778] kobject: 'rx-8' (00000000fad371c5): kobject_uevent_env [ 315.030170] kobject: 'rx-8' (00000000fad371c5): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-8' [ 315.040548] kobject: 'rx-9' (000000004b3677b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.049980] kobject: 'rx-9' (000000004b3677b6): kobject_uevent_env [ 315.056316] kobject: 'rx-9' (000000004b3677b6): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-9' [ 315.066720] kobject: 'rx-10' (000000007bdb471d): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.076275] kobject: 'rx-10' (000000007bdb471d): kobject_uevent_env [ 315.082747] kobject: 'rx-10' (000000007bdb471d): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-10' [ 315.093315] kobject: 'rx-11' (0000000031d36dd9): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.102978] kobject: 'rx-11' (0000000031d36dd9): kobject_uevent_env [ 315.109460] kobject: 'rx-11' (0000000031d36dd9): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-11' [ 315.120660] kobject: 'rx-12' (000000007a50b366): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.130188] kobject: 'rx-12' (000000007a50b366): kobject_uevent_env [ 315.136623] kobject: 'rx-12' (000000007a50b366): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-12' [ 315.147218] kobject: 'rx-13' (000000009071f1e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.156962] kobject: 'rx-13' (000000009071f1e0): kobject_uevent_env [ 315.163464] kobject: 'rx-13' (000000009071f1e0): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-13' [ 315.174236] kobject: 'rx-14' (0000000041374620): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.183803] kobject: 'rx-14' (0000000041374620): kobject_uevent_env [ 315.190272] kobject: 'rx-14' (0000000041374620): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-14' [ 315.201150] kobject: 'rx-15' (00000000be24868b): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.210696] kobject: 'rx-15' (00000000be24868b): kobject_uevent_env [ 315.217117] kobject: 'rx-15' (00000000be24868b): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/rx-15' [ 315.227697] kobject: 'tx-0' (00000000330af07f): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.237149] kobject: 'tx-0' (00000000330af07f): kobject_uevent_env [ 315.243858] kobject: 'tx-0' (00000000330af07f): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-0' [ 315.254306] kobject: 'tx-1' (00000000fd121bfb): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.264038] kobject: 'tx-1' (00000000fd121bfb): kobject_uevent_env [ 315.270415] kobject: 'tx-1' (00000000fd121bfb): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-1' [ 315.280820] kobject: 'tx-2' (00000000cf5d9558): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.290610] kobject: 'tx-2' (00000000cf5d9558): kobject_uevent_env [ 315.296939] kobject: 'tx-2' (00000000cf5d9558): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-2' [ 315.307427] kobject: 'tx-3' (000000001966dc5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.316884] kobject: 'tx-3' (000000001966dc5b): kobject_uevent_env [ 315.323257] kobject: 'tx-3' (000000001966dc5b): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-3' [ 315.333922] kobject: 'tx-4' (0000000094e69c16): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.343522] kobject: 'tx-4' (0000000094e69c16): kobject_uevent_env [ 315.349877] kobject: 'tx-4' (0000000094e69c16): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-4' [ 315.360304] kobject: 'tx-5' (0000000044c227e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.369784] kobject: 'tx-5' (0000000044c227e3): kobject_uevent_env [ 315.376103] kobject: 'tx-5' (0000000044c227e3): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-5' [ 315.386941] kobject: 'tx-6' (00000000c0a34355): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.396538] kobject: 'tx-6' (00000000c0a34355): kobject_uevent_env [ 315.402886] kobject: 'tx-6' (00000000c0a34355): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-6' [ 315.413312] kobject: 'tx-7' (000000009b6baf56): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.422791] kobject: 'tx-7' (000000009b6baf56): kobject_uevent_env [ 315.429174] kobject: 'tx-7' (000000009b6baf56): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-7' [ 315.439890] kobject: 'tx-8' (0000000036bd0fbd): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.449547] kobject: 'tx-8' (0000000036bd0fbd): kobject_uevent_env [ 315.455906] kobject: 'tx-8' (0000000036bd0fbd): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-8' [ 315.466325] kobject: 'tx-9' (0000000097bbe83a): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.475803] kobject: 'tx-9' (0000000097bbe83a): kobject_uevent_env [ 315.482184] kobject: 'tx-9' (0000000097bbe83a): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-9' [ 315.492620] kobject: 'tx-10' (00000000e3c5aada): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.502791] kobject: 'tx-10' (00000000e3c5aada): kobject_uevent_env [ 315.509543] kobject: 'tx-10' (00000000e3c5aada): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-10' [ 315.520132] kobject: 'tx-11' (0000000018958787): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.529707] kobject: 'tx-11' (0000000018958787): kobject_uevent_env [ 315.536115] kobject: 'tx-11' (0000000018958787): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-11' [ 315.546709] kobject: 'tx-12' (00000000f1a898fe): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.556383] kobject: 'tx-12' (00000000f1a898fe): kobject_uevent_env [ 315.562865] kobject: 'tx-12' (00000000f1a898fe): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-12' [ 315.573440] kobject: 'tx-13' (000000001682500a): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.582987] kobject: 'tx-13' (000000001682500a): kobject_uevent_env [ 315.589798] kobject: 'tx-13' (000000001682500a): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-13' [ 315.600411] kobject: 'tx-14' (00000000fece160f): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.610117] kobject: 'tx-14' (00000000fece160f): kobject_uevent_env [ 315.616541] kobject: 'tx-14' (00000000fece160f): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-14' [ 315.627196] kobject: 'tx-15' (00000000d120ca57): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.636814] kobject: 'tx-15' (00000000d120ca57): kobject_uevent_env [ 315.643294] kobject: 'tx-15' (00000000d120ca57): fill_kobj_path: path = '/devices/virtual/net/bond87/queues/tx-15' 12:24:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xe50a0100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0x14101}]}}}]}, 0x3c}}, 0x0) 12:24:50 executing program 3: r0 = socket$inet6(0xa, 0x800000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 12:24:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300030000000000000000003800000000000000000000000000200001"], 0x2d) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 12:24:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x100000000, @dev={0xfe, 0x80, [], 0xa}, 0x10001}, @in={0x2, 0x4e24, @loopback}], 0x2c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) r3 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r2, r3}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xa3ec}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r4, 0x40, 0x75, 0x6}, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) 12:24:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x150000) 12:24:50 executing program 4 (fault-call:2 fault-nth:48): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x800, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x9, r1, 0x0, [0x305f, 0xa]}, 0x2c) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 315.671818] kobject: 'loop2' (000000009b89c6c4): kobject_uevent_env [ 315.678805] kobject: 'loop2' (000000009b89c6c4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 315.692878] kobject: 'loop5' (000000009a0a8346): kobject_uevent_env [ 315.733064] FAULT_INJECTION: forcing a failure. [ 315.733064] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.748218] kobject: 'loop5' (000000009a0a8346): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 315.754236] CPU: 0 PID: 12196 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #362 [ 315.765036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.770932] kobject: 'loop4' (0000000089902ec2): kobject_uevent_env [ 315.774392] Call Trace: [ 315.774414] dump_stack+0x244/0x39d [ 315.774434] ? dump_stack_print_info.cold.1+0x20/0x20 [ 315.781702] kobject: 'loop4' (0000000089902ec2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 315.783407] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 315.783426] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 315.783446] should_fail.cold.4+0xa/0x17 [ 315.801825] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 315.806694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.806717] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 315.827959] kobject: 'bond88' (000000000e0042a6): kobject_add_internal: parent: 'net', set: 'devices' [ 315.829512] kobject: 'bond88' (000000000e0042a6): kobject_uevent_env [ 315.832893] ? kasan_check_read+0x11/0x20 [ 315.832914] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 315.844010] kobject: 'bond88' (000000000e0042a6): fill_kobj_path: path = '/devices/virtual/net/bond88' [ 315.848781] ? unwind_dump+0x190/0x190 [ 315.848804] ? is_bpf_text_address+0xd3/0x170 [ 315.848825] ? fs_reclaim_acquire+0x20/0x20 [ 315.853699] kobject: 'queues' (00000000cf839ee2): kobject_add_internal: parent: 'bond88', set: '' [ 315.858229] ? lock_downgrade+0x900/0x900 [ 315.858247] ? lock_release+0xa00/0xa00 [ 315.858263] ? perf_trace_sched_process_exec+0x860/0x860 [ 315.858282] ? __might_sleep+0x95/0x190 [ 315.858301] __alloc_pages_nodemask+0x366/0xea0 [ 315.868094] kobject: 'queues' (00000000cf839ee2): kobject_uevent_env [ 315.871633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.871652] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 315.871670] ? kasan_check_read+0x11/0x20 [ 315.876194] kobject: 'queues' (00000000cf839ee2): kobject_uevent_env: filter function caused the event to drop! [ 315.880470] ? do_raw_spin_unlock+0xa7/0x330 [ 315.880499] ? do_raw_spin_trylock+0x270/0x270 [ 315.880530] ? trace_hardirqs_on+0xbd/0x310 [ 315.880550] ? kasan_unpoison_shadow+0x35/0x50 [ 315.880569] ? kasan_kmalloc+0xc7/0xe0 [ 315.890861] kobject: 'rx-0' (00000000a1f7cb40): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.894264] ? kasan_unpoison_shadow+0x35/0x50 [ 315.894283] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 315.894302] alloc_pages_current+0x173/0x350 [ 315.899612] kobject: 'rx-0' (00000000a1f7cb40): kobject_uevent_env [ 315.903710] __vmalloc_node_range+0x498/0x750 [ 315.903733] ? htab_map_alloc+0x29e/0x1190 [ 315.903768] __vmalloc_node_flags_caller+0x75/0x90 [ 315.908077] kobject: 'rx-0' (00000000a1f7cb40): fill_kobj_path: path = '/devices/virtual/net/bond88/queues/rx-0' [ 315.912397] ? htab_map_alloc+0x29e/0x1190 [ 315.912413] bpf_map_area_alloc+0x6f/0x90 [ 315.912432] htab_map_alloc+0x29e/0x1190 12:24:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000000000000000000000320030000000000000000003800000000000000000400000000200001e7936bffa690abd10a51ebe83b9adcd63097fa3d5309742d578ba1c2c47bac5ce6d35a2880b84215411363e0082bd3f613288ccce44c5ef2870cdd04502bd9b23c9ecaac3713557d476903f9478fa7126baf4d454d670aab4d770722db6f4bebfa74e8e567bd7fb25