0)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2928.977770][T14761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2928.984820][T14761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2928.992169][T14761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2928.999265][T14761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2929.012199][T14762] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:51:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc20, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2929.024631][T14913] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:51:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x29}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:51:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x60, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc24, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2929.224671][T15192] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:51:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:51:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x60}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc28, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2929.402049][T15494] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:51:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:58 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:51:58 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:51:58 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:51:58 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000b00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2930.604944][T15520] bridge0: port 2(bridge_slave_1) entered disabled state [ 2930.612226][T15520] bridge0: port 1(bridge_slave_0) entered disabled state 05:51:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc2c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:59 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:51:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x2}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:51:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2930.702272][T15723] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2930.728947][T16371] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2930.760359][T16374] device Y4`Ҙ entered promiscuous mode [ 2930.766907][T16374] device tunl0 entered promiscuous mode [ 2930.772990][T16374] device gre0 entered promiscuous mode [ 2930.778914][T16374] device gretap0 entered promiscuous mode [ 2930.785305][T16374] device erspan0 entered promiscuous mode [ 2930.791720][T16374] device ip_vti0 entered promiscuous mode [ 2930.798081][T16374] device ip6_vti0 entered promiscuous mode [ 2930.804379][T16374] device sit0 entered promiscuous mode 05:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2930.810511][T16374] device ip6tnl0 entered promiscuous mode [ 2930.817157][T16374] device ip6gre0 entered promiscuous mode [ 2930.823576][T16374] device syz_tun entered promiscuous mode [ 2930.829892][T16374] device ip6gretap0 entered promiscuous mode [ 2930.836539][T16374] device bridge0 entered promiscuous mode 05:51:59 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000d00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:51:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x500}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2930.899757][T16588] device Y4`Ҙ left promiscuous mode 05:51:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:00 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:00 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:00 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000001100000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2932.234851][T16588] bridge0: port 2(bridge_slave_1) entered disabled state [ 2932.242378][T16588] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc30, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:00 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000001200000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2932.304876][T16589] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5c3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000001d00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2932.550348][T17266] bridge0: port 2(bridge_slave_1) entered blocking state [ 2932.557399][T17266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2932.564671][T17266] bridge0: port 1(bridge_slave_0) entered blocking state [ 2932.571707][T17266] bridge0: port 1(bridge_slave_0) entered forwarding state 05:52:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc34, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2932.599893][T17405] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x600}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2932.720550][T17440] bridge0: port 2(bridge_slave_1) entered blocking state [ 2932.727671][T17440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2932.734913][T17440] bridge0: port 1(bridge_slave_0) entered blocking state [ 2932.742050][T17440] bridge0: port 1(bridge_slave_0) entered forwarding state 05:52:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000002100000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000002900000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000003200000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:02 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000005800000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2934.381351][T17655] bridge0: port 2(bridge_slave_1) entered disabled state [ 2934.388427][T17655] bridge0: port 1(bridge_slave_0) entered disabled state [ 2934.411192][T17657] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc38, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:02 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000006400000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2934.427515][T17658] device Y4`Ҙ left promiscuous mode [ 2934.468212][T17658] device tunl0 left promiscuous mode [ 2934.490074][T17658] device gre0 left promiscuous mode [ 2934.713695][T17658] device gretap0 left promiscuous mode [ 2934.742170][T17658] device erspan0 left promiscuous mode [ 2934.770326][T17658] device ip_vti0 left promiscuous mode [ 2934.789297][T17658] device ip6_vti0 left promiscuous mode [ 2934.820675][T17658] device sit0 left promiscuous mode [ 2935.017426][T17658] device ip6tnl0 left promiscuous mode [ 2935.046954][T17658] device ip6gre0 left promiscuous mode [ 2935.246715][T17658] device syz_tun left promiscuous mode [ 2935.273840][T17658] device ip6gretap0 left promiscuous mode 05:52:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x700}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:03 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000008800000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2935.302355][T17658] bridge0: port 2(bridge_slave_1) entered disabled state [ 2935.309449][T17658] bridge0: port 1(bridge_slave_0) entered disabled state [ 2935.316547][T17658] device bridge0 left promiscuous mode 05:52:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 05:52:03 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000009800000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2935.467090][T18400] bridge0: port 2(bridge_slave_1) entered blocking state [ 2935.474209][T18400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2935.481619][T18400] bridge0: port 1(bridge_slave_0) entered blocking state [ 2935.489142][T18400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2935.497780][T18402] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc3c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) [ 2935.516608][T18617] device Y4`Ҙ entered promiscuous mode [ 2935.523225][T18617] device tunl0 entered promiscuous mode [ 2935.529490][T18617] device gre0 entered promiscuous mode [ 2935.535470][T18617] device gretap0 entered promiscuous mode [ 2935.541764][T18617] device erspan0 entered promiscuous mode [ 2935.548169][T18617] device ip_vti0 entered promiscuous mode [ 2935.554620][T18617] device ip6_vti0 entered promiscuous mode [ 2935.561083][T18617] device sit0 entered promiscuous mode 05:52:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2935.567163][T18617] device ip6tnl0 entered promiscuous mode [ 2935.573440][T18617] device ip6gre0 entered promiscuous mode [ 2935.579850][T18617] device syz_tun entered promiscuous mode [ 2935.586021][T18617] device ip6gretap0 entered promiscuous mode [ 2935.592562][T18617] device bridge0 entered promiscuous mode 05:52:04 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 05:52:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 05:52:04 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000d400000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 05:52:04 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000e800000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 05:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x7}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc40, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 05:52:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xa00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000004001000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2936.718268][T18830] bridge0: port 2(bridge_slave_1) entered disabled state [ 2936.725462][T18830] bridge0: port 1(bridge_slave_0) entered disabled state [ 2936.744589][T18832] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 05:52:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000006601000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 05:52:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000006a01000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2937.111840][T19481] bridge0: port 2(bridge_slave_1) entered blocking state [ 2937.119140][T19481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2937.126920][T19481] bridge0: port 1(bridge_slave_0) entered blocking state [ 2937.134180][T19481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2937.176982][T19487] device Y4`Ҙ left promiscuous mode [ 2937.183047][T19487] device tunl0 left promiscuous mode [ 2937.189127][T19487] device gre0 left promiscuous mode [ 2937.194811][T19487] device gretap0 left promiscuous mode [ 2937.200889][T19487] device erspan0 left promiscuous mode [ 2937.206969][T19487] device ip_vti0 left promiscuous mode [ 2937.212983][T19487] device ip6_vti0 left promiscuous mode [ 2937.220099][T19487] device sit0 left promiscuous mode 05:52:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc44, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2937.226031][T19487] device ip6tnl0 left promiscuous mode [ 2937.232140][T19487] device ip6gre0 left promiscuous mode [ 2937.238355][T19487] device syz_tun left promiscuous mode [ 2937.244429][T19487] device ip6gretap0 left promiscuous mode [ 2937.250761][T19487] device bridge0 left promiscuous mode [ 2937.256465][T19488] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000007a01000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xb}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000009001000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000009801000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffef}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000ca01000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x9}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc48, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:07 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000002802000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2938.664358][T19918] bridge0: port 2(bridge_slave_1) entered disabled state [ 2938.671544][T19918] bridge0: port 1(bridge_slave_0) entered disabled state [ 2938.690779][T19921] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xd}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2938.736027][T20293] device Y4`Ҙ entered promiscuous mode [ 2938.744081][T20293] device tunl0 entered promiscuous mode [ 2938.751577][T20293] device gre0 entered promiscuous mode [ 2938.759389][T20293] device gretap0 entered promiscuous mode [ 2938.766665][T20293] device erspan0 entered promiscuous mode [ 2938.774011][T20293] device ip_vti0 entered promiscuous mode 05:52:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2938.781433][T20293] device ip6_vti0 entered promiscuous mode [ 2938.788584][T20293] device sit0 entered promiscuous mode [ 2938.795956][T20293] device ip6tnl0 entered promiscuous mode [ 2938.803270][T20293] device ip6gre0 entered promiscuous mode [ 2938.810628][T20293] device syz_tun entered promiscuous mode [ 2938.818182][T20293] device ip6gretap0 entered promiscuous mode [ 2938.825562][T20293] device bridge0 entered promiscuous mode 05:52:07 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000002a02000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc4c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2939.001890][T20669] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2939.077126][T20667] bridge0: port 2(bridge_slave_1) entered blocking state [ 2939.084173][T20667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2939.091622][T20667] bridge0: port 1(bridge_slave_0) entered blocking state [ 2939.098661][T20667] bridge0: port 1(bridge_slave_0) entered forwarding state 05:52:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xe}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2939.133206][T20666] device Y4`Ҙ entered promiscuous mode [ 2939.139865][T20666] device tunl0 entered promiscuous mode [ 2939.145977][T20666] device gre0 entered promiscuous mode [ 2939.152015][T20666] device gretap0 entered promiscuous mode [ 2939.158255][T20666] device erspan0 entered promiscuous mode [ 2939.164523][T20666] device ip_vti0 entered promiscuous mode [ 2939.170953][T20666] device ip6_vti0 entered promiscuous mode [ 2939.177342][T20666] device sit0 entered promiscuous mode 05:52:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffc3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xa}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x2100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2939.183415][T20666] device ip6tnl0 entered promiscuous mode [ 2939.190073][T20666] device ip6gre0 entered promiscuous mode [ 2939.196574][T20666] device syz_tun entered promiscuous mode [ 2939.202870][T20666] device ip6gretap0 entered promiscuous mode [ 2939.209544][T20666] device bridge0 entered promiscuous mode 05:52:07 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000f402000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc50, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2939.325701][T20984] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000002203000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000008203000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000008c03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000009c03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000c003000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2940.440907][T20991] bridge0: port 2(bridge_slave_1) entered disabled state [ 2940.448094][T20991] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffc3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000ca03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x2900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc54, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x10}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2940.499249][T21011] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000cc03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xe}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc58, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2940.693683][T22219] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x3b4e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x11}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000d403000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000da03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000f403000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2941.146547][T22365] bridge0: port 2(bridge_slave_1) entered blocking state [ 2941.153669][T22365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2941.161505][T22365] bridge0: port 1(bridge_slave_0) entered blocking state [ 2941.168728][T22365] bridge0: port 1(bridge_slave_0) entered forwarding state 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000fa03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc5c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2941.207268][T22368] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffff9e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4788}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x12}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x10}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000fc03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc60, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2941.381185][T23000] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000fd03000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2942.314290][T23001] bridge0: port 2(bridge_slave_1) entered disabled state [ 2942.321568][T23001] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x21}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x21}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2943.195734][T23005] bridge0: port 2(bridge_slave_1) entered disabled state [ 2943.202817][T23005] bridge0: port 1(bridge_slave_0) entered disabled state [ 2943.222824][T23011] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2943.236729][T24059] device Y4`Ҙ left promiscuous mode 05:52:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc64, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:11 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2943.252119][T24059] device tunl0 left promiscuous mode [ 2943.263887][T24059] device gre0 left promiscuous mode [ 2943.320711][T24059] device gretap0 left promiscuous mode [ 2943.336419][T24059] device erspan0 left promiscuous mode [ 2943.356752][T24059] device ip_vti0 left promiscuous mode 05:52:11 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000d000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2943.374802][T24059] device ip6_vti0 left promiscuous mode [ 2943.393730][T24059] device sit0 left promiscuous mode [ 2943.418391][T24059] device ip6tnl0 left promiscuous mode [ 2943.426247][T24059] device ip6gre0 left promiscuous mode [ 2943.451909][T24059] device syz_tun left promiscuous mode [ 2943.460147][T24059] device ip6gretap0 left promiscuous mode [ 2943.468265][T24059] bridge0: port 2(bridge_slave_1) entered blocking state [ 2943.475450][T24059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2943.482874][T24059] bridge0: port 1(bridge_slave_0) entered blocking state [ 2943.489927][T24059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2943.497309][T24059] device bridge0 left promiscuous mode [ 2943.505365][T24060] device Y4`Ҙ left promiscuous mode [ 2943.511738][T24060] device tunl0 left promiscuous mode 05:52:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2943.517577][T24060] device gre0 left promiscuous mode [ 2943.523377][T24060] device gretap0 left promiscuous mode [ 2943.529589][T24060] device erspan0 left promiscuous mode [ 2943.535698][T24060] device ip_vti0 left promiscuous mode [ 2943.541814][T24060] device ip6_vti0 left promiscuous mode [ 2943.547934][T24060] device sit0 left promiscuous mode [ 2943.553553][T24060] device ip6tnl0 left promiscuous mode [ 2943.559543][T24060] device ip6gre0 left promiscuous mode 05:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4dc9}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc68, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x25}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2943.565528][T24060] device syz_tun left promiscuous mode [ 2943.571452][T24060] device ip6gretap0 left promiscuous mode [ 2943.577559][T24060] device bridge0 left promiscuous mode [ 2943.591479][T24272] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x60}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2943.673154][T24273] bridge0: port 2(bridge_slave_1) entered blocking state [ 2943.680215][T24273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2943.687574][T24273] bridge0: port 1(bridge_slave_0) entered blocking state [ 2943.694627][T24273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2943.954443][T24489] device Y4`Ҙ entered promiscuous mode [ 2943.962026][T24489] device tunl0 entered promiscuous mode [ 2943.969150][T24489] device gre0 entered promiscuous mode [ 2943.989400][T24489] device gretap0 entered promiscuous mode [ 2943.997342][T24489] device erspan0 entered promiscuous mode 05:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x48}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x25}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2944.005009][T24489] device ip_vti0 entered promiscuous mode [ 2944.012602][T24489] device ip6_vti0 entered promiscuous mode [ 2944.020489][T24489] device sit0 entered promiscuous mode [ 2944.043691][T24489] device ip6tnl0 entered promiscuous mode [ 2944.051057][T24489] device ip6gre0 entered promiscuous mode [ 2944.075756][T24489] device syz_tun entered promiscuous mode [ 2944.083305][T24489] device ip6gretap0 entered promiscuous mode [ 2944.091443][T24489] bridge0: port 2(bridge_slave_1) entered blocking state [ 2944.098481][T24489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2944.105812][T24489] bridge0: port 1(bridge_slave_0) entered blocking state [ 2944.112891][T24489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2944.120375][T24489] device bridge0 entered promiscuous mode 05:52:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc6c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4e3b}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2944.128580][T24491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000012000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000322000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000228000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2945.093236][T24596] bridge0: port 2(bridge_slave_1) entered disabled state [ 2945.100330][T24596] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4c}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000029000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x25}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:14 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000022a000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2945.979909][T24706] bridge0: port 2(bridge_slave_1) entered disabled state [ 2945.986983][T24706] bridge0: port 1(bridge_slave_0) entered disabled state [ 2946.005813][T24719] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2946.016232][T24738] device Y4`Ҙ left promiscuous mode [ 2946.023768][T24738] device tunl0 left promiscuous mode [ 2946.030989][T24738] device gre0 left promiscuous mode [ 2946.038880][T24738] device gretap0 left promiscuous mode [ 2946.045705][T24738] device erspan0 left promiscuous mode [ 2946.053030][T24738] device ip_vti0 left promiscuous mode [ 2946.060156][T24738] device ip6_vti0 left promiscuous mode [ 2946.067694][T24738] device sit0 left promiscuous mode [ 2946.075060][T24738] device ip6tnl0 left promiscuous mode 05:52:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5865}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc70, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2946.082454][T24738] device ip6gre0 left promiscuous mode [ 2946.089757][T24738] device syz_tun left promiscuous mode [ 2946.096700][T24738] device ip6gretap0 left promiscuous mode [ 2946.103705][T24738] device bridge0 left promiscuous mode [ 2946.111739][T10896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2946.120521][T25653] device Y4`Ҙ entered promiscuous mode [ 2946.127187][T25653] device tunl0 entered promiscuous mode [ 2946.133490][T25653] device gre0 entered promiscuous mode [ 2946.139507][T25653] device gretap0 entered promiscuous mode [ 2946.145790][T25653] device erspan0 entered promiscuous mode [ 2946.152275][T25653] device ip_vti0 entered promiscuous mode [ 2946.159038][T25653] device ip6_vti0 entered promiscuous mode [ 2946.165419][T25653] device sit0 entered promiscuous mode [ 2946.171820][T25653] device ip6tnl0 entered promiscuous mode [ 2946.178156][T25653] device ip6gre0 entered promiscuous mode 05:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x500}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x60}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2946.184545][T25653] device syz_tun entered promiscuous mode [ 2946.190931][T25653] device ip6gretap0 entered promiscuous mode [ 2946.197602][T25653] device bridge0 entered promiscuous mode 05:52:14 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000032000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc74, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffff7f}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2946.401779][T25977] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x68}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5c3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:15 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc78, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2946.566156][T26290] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2946.610144][T26293] device Y4`Ҙ entered promiscuous mode [ 2946.618012][T26293] device tunl0 entered promiscuous mode [ 2946.625058][T26293] device gre0 entered promiscuous mode [ 2946.642802][T26293] device gretap0 entered promiscuous mode [ 2946.650246][T26293] device erspan0 entered promiscuous mode [ 2946.657839][T26293] device ip_vti0 entered promiscuous mode [ 2946.665395][T26293] device ip6_vti0 entered promiscuous mode [ 2946.673131][T26293] device sit0 entered promiscuous mode [ 2946.695544][T26293] device ip6tnl0 entered promiscuous mode [ 2946.703375][T26293] device ip6gre0 entered promiscuous mode [ 2946.728123][T26293] device syz_tun entered promiscuous mode [ 2946.735972][T26293] device ip6gretap0 entered promiscuous mode [ 2946.744447][T26293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2946.751612][T26293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2946.758954][T26293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2946.765974][T26293] bridge0: port 1(bridge_slave_0) entered forwarding state 05:52:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2946.773365][T26293] device bridge0 entered promiscuous mode 05:52:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6c}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:15 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000140000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000058000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000064000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000166000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2948.026033][T26300] bridge0: port 2(bridge_slave_1) entered disabled state [ 2948.033295][T26300] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6558}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x600}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:16 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2948.174160][T26302] bridge0: port 2(bridge_slave_1) entered blocking state [ 2948.181243][T26302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2948.188635][T26302] bridge0: port 1(bridge_slave_0) entered blocking state [ 2948.195698][T26302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2948.207031][T26353] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2948.216462][T10896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc7c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x74}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2948.224669][T10896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2948.240355][T26832] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000016a000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88a8ffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2948.500695][T27057] device Y4`Ҙ left promiscuous mode [ 2948.545334][T27057] device tunl0 left promiscuous mode [ 2948.569772][T27057] device gre0 left promiscuous mode 05:52:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000017a000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000382000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000088000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2948.848932][T27057] device gretap0 left promiscuous mode [ 2948.891240][T27057] device erspan0 left promiscuous mode 05:52:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000038c000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2948.933354][T27057] device ip_vti0 left promiscuous mode [ 2948.964144][T27057] device ip6_vti0 left promiscuous mode [ 2949.005969][T27057] device sit0 left promiscuous mode 05:52:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000190000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2949.274570][T27057] device ip6tnl0 left promiscuous mode [ 2949.305265][T27057] device ip6gre0 left promiscuous mode [ 2949.519585][T27057] device syz_tun left promiscuous mode [ 2949.548691][T27057] device ip6gretap0 left promiscuous mode [ 2949.578661][T27057] bridge0: port 2(bridge_slave_1) entered disabled state [ 2949.585837][T27057] bridge0: port 1(bridge_slave_0) entered disabled state [ 2949.593006][T27057] device bridge0 left promiscuous mode [ 2949.622605][T27055] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2949.632474][T27056] device Y4`Ҙ entered promiscuous mode [ 2949.638887][T27056] device tunl0 entered promiscuous mode [ 2949.645041][T27056] device gre0 entered promiscuous mode [ 2949.650999][T27056] device gretap0 entered promiscuous mode [ 2949.657268][T27056] device erspan0 entered promiscuous mode [ 2949.663884][T27056] device ip_vti0 entered promiscuous mode 05:52:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000098000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x700}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc80, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7a}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2949.670198][T27056] device ip6_vti0 entered promiscuous mode [ 2949.676760][T27056] device sit0 entered promiscuous mode [ 2949.682889][T27056] device ip6tnl0 entered promiscuous mode [ 2949.689301][T27056] device ip6gre0 entered promiscuous mode [ 2949.695557][T27056] device syz_tun entered promiscuous mode [ 2949.701991][T27056] device ip6gretap0 entered promiscuous mode [ 2949.708556][T27056] device bridge0 entered promiscuous mode 05:52:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88a8ffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc84, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000198000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2949.783214][T27907] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2949.797731][T27906] device Y4`Ҙ entered promiscuous mode [ 2949.807690][T27906] device tunl0 entered promiscuous mode [ 2949.817480][T27906] device gre0 entered promiscuous mode [ 2949.826680][T27906] device gretap0 entered promiscuous mode [ 2949.836090][T27906] device erspan0 entered promiscuous mode [ 2949.843867][T27906] device ip_vti0 entered promiscuous mode [ 2949.853620][T27906] device ip6_vti0 entered promiscuous mode [ 2949.863568][T27906] device sit0 entered promiscuous mode [ 2949.873450][T27906] device ip6tnl0 entered promiscuous mode [ 2949.883017][T27906] device ip6gre0 entered promiscuous mode [ 2949.890481][T27906] device syz_tun entered promiscuous mode [ 2949.898481][T27906] device ip6gretap0 entered promiscuous mode [ 2949.908141][T27906] device bridge0 entered promiscuous mode 05:52:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8847}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2949.970683][T28133] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc88, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) accept4$tipc(0xffffffffffffffff, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10, 0x1000) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000039c000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2950.158507][T28336] device Y4`Ҙ left promiscuous mode [ 2950.166096][T28336] device tunl0 left promiscuous mode [ 2950.173230][T28336] device gre0 left promiscuous mode [ 2950.193367][T28336] device gretap0 left promiscuous mode [ 2950.201124][T28336] device erspan0 left promiscuous mode 05:52:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xa00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2950.209257][T28336] device ip_vti0 left promiscuous mode [ 2950.216874][T28336] device ip6_vti0 left promiscuous mode [ 2950.224645][T28336] device sit0 left promiscuous mode [ 2950.248465][T28336] device ip6tnl0 left promiscuous mode [ 2950.256146][T28336] device ip6gre0 left promiscuous mode [ 2950.280146][T28336] device syz_tun left promiscuous mode [ 2950.287871][T28336] device ip6gretap0 left promiscuous mode [ 2950.296094][T28336] bridge0: port 2(bridge_slave_1) entered blocking state [ 2950.303220][T28336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2950.310706][T28336] bridge0: port 1(bridge_slave_0) entered blocking state [ 2950.317738][T28336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2950.325122][T28336] device bridge0 left promiscuous mode [ 2950.338440][T28437] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2950.348326][T28490] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2950.362691][T28541] device Y4`Ҙ left promiscuous mode [ 2950.369013][T28541] device tunl0 left promiscuous mode [ 2950.374835][T28541] device gre0 left promiscuous mode 05:52:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8848}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xc94, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2950.380598][T28541] device gretap0 left promiscuous mode [ 2950.386523][T28541] device erspan0 left promiscuous mode [ 2950.392563][T28541] device ip_vti0 left promiscuous mode [ 2950.398852][T28541] device ip6_vti0 left promiscuous mode [ 2950.404779][T28541] device sit0 left promiscuous mode [ 2950.410723][T28541] device ip6tnl0 left promiscuous mode [ 2950.417035][T28541] device ip6gre0 left promiscuous mode [ 2950.422847][T28541] device syz_tun left promiscuous mode 05:52:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x39f}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2950.428794][T28541] device ip6gretap0 left promiscuous mode [ 2950.434904][T28541] device bridge0 left promiscuous mode 05:52:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x74000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2950.747098][T28653] device Y4`Ҙ left promiscuous mode [ 2950.756129][T28653] device tunl0 left promiscuous mode [ 2950.766329][T28653] device gre0 left promiscuous mode [ 2950.776028][T28653] device gretap0 left promiscuous mode [ 2950.783317][T28653] device erspan0 left promiscuous mode 05:52:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003c0000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2950.793569][T28653] device ip_vti0 left promiscuous mode [ 2950.803477][T28653] device ip6_vti0 left promiscuous mode [ 2950.812876][T28653] device sit0 left promiscuous mode [ 2950.821819][T28653] device ip6tnl0 left promiscuous mode [ 2950.831819][T28653] device ip6gre0 left promiscuous mode [ 2950.840426][T28653] device syz_tun left promiscuous mode 05:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xca0, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2950.849089][T28653] device ip6gretap0 left promiscuous mode [ 2950.858249][T28653] device bridge0 left promiscuous mode [ 2950.864875][T14446] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xbd5}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000001ca000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003ca000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003cc000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000d4000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2951.778321][T28656] bridge0: port 2(bridge_slave_1) entered disabled state [ 2951.785507][T28656] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc305}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003d4000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x500}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2951.823056][T28662] device Y4`Ҙ left promiscuous mode [ 2951.858543][T28662] device tunl0 left promiscuous mode 05:52:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003da000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2951.880187][T28662] device gre0 left promiscuous mode [ 2952.120057][T28662] device gretap0 left promiscuous mode [ 2952.149726][T28662] device erspan0 left promiscuous mode [ 2952.178914][T28662] device ip_vti0 left promiscuous mode [ 2952.197253][T28662] device ip6_vti0 left promiscuous mode [ 2952.228313][T28662] device sit0 left promiscuous mode [ 2952.443587][T28662] device ip6tnl0 left promiscuous mode [ 2952.473526][T28662] device ip6gre0 left promiscuous mode [ 2952.673783][T28662] device syz_tun left promiscuous mode [ 2952.702285][T28662] device ip6gretap0 left promiscuous mode [ 2952.732009][T28662] bridge0: port 2(bridge_slave_1) entered disabled state [ 2952.739179][T28662] bridge0: port 1(bridge_slave_0) entered disabled state [ 2952.746335][T28662] device bridge0 left promiscuous mode 05:52:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x74000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000e8000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2952.785143][T28903] __nla_validate_parse: 1 callbacks suppressed [ 2952.785159][T28903] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2952.802103][T28973] device Y4`Ҙ entered promiscuous mode [ 2952.810455][T28973] device tunl0 entered promiscuous mode [ 2952.818198][T28973] device gre0 entered promiscuous mode [ 2952.837250][T28973] device gretap0 entered promiscuous mode [ 2952.845775][T28973] device erspan0 entered promiscuous mode [ 2952.854451][T28973] device ip_vti0 entered promiscuous mode [ 2952.862320][T28973] device ip6_vti0 entered promiscuous mode [ 2952.870123][T28973] device sit0 entered promiscuous mode [ 2952.892129][T28973] device ip6tnl0 entered promiscuous mode [ 2952.899974][T28973] device ip6gre0 entered promiscuous mode [ 2952.924224][T28973] device syz_tun entered promiscuous mode [ 2952.932410][T28973] device ip6gretap0 entered promiscuous mode [ 2952.940716][T28973] bridge0: port 2(bridge_slave_1) entered blocking state [ 2952.947783][T28973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2952.955049][T28973] bridge0: port 1(bridge_slave_0) entered blocking state [ 2952.962170][T28973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2952.969458][T28973] device bridge0 entered promiscuous mode [ 2952.982730][T29506] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xdd4, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xbd7}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5c3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2952.992505][T23961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2953.007295][T29717] device Y4`Ҙ entered promiscuous mode [ 2953.015327][T29717] device tunl0 entered promiscuous mode [ 2953.023026][T29717] device gre0 entered promiscuous mode [ 2953.039924][T29717] device gretap0 entered promiscuous mode [ 2953.047664][T29717] device erspan0 entered promiscuous mode [ 2953.055335][T29717] device ip_vti0 entered promiscuous mode [ 2953.062797][T29717] device ip6_vti0 entered promiscuous mode [ 2953.071171][T29717] device sit0 entered promiscuous mode 05:52:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000002f4000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2953.096207][T29717] device ip6tnl0 entered promiscuous mode [ 2953.104568][T29717] device ip6gre0 entered promiscuous mode [ 2953.128669][T29717] device syz_tun entered promiscuous mode [ 2953.136908][T29717] device ip6gretap0 entered promiscuous mode 05:52:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc94d}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2953.145143][T29717] bridge0: port 2(bridge_slave_1) entered blocking state [ 2953.152335][T29717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2953.159647][T29717] bridge0: port 1(bridge_slave_0) entered blocking state [ 2953.166930][T29717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2953.174224][T29717] device bridge0 entered promiscuous mode 05:52:21 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10, 0x1000) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:52:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xddc, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2953.367319][T30039] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003f4000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x600}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x34000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe04, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2953.548615][T30355] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x700}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003fa000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2953.662743][T30418] device Y4`Ҙ left promiscuous mode [ 2953.702921][T30418] device tunl0 left promiscuous mode [ 2953.722635][T30418] device gre0 left promiscuous mode 05:52:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003fc000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000003fd000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2953.960977][T30418] device gretap0 left promiscuous mode [ 2953.994021][T30418] device erspan0 left promiscuous mode [ 2954.030846][T30418] device ip_vti0 left promiscuous mode [ 2954.050859][T30418] device ip6_vti0 left promiscuous mode [ 2954.085531][T30418] device sit0 left promiscuous mode [ 2954.296562][T30418] device ip6tnl0 left promiscuous mode [ 2954.325903][T30418] device ip6gre0 left promiscuous mode 05:52:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 1) 05:52:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000e8d61e0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2954.459405][T30946] FAULT_INJECTION: forcing a failure. [ 2954.459405][T30946] name failslab, interval 1, probability 0, space 0, times 0 [ 2954.472378][T30946] CPU: 1 PID: 30946 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2954.482227][T30946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.492690][T30946] Call Trace: [ 2954.495968][T30946] [ 2954.498985][T30946] dump_stack_lvl+0xd6/0x122 [ 2954.503601][T30946] dump_stack+0x11/0x1b [ 2954.507759][T30946] should_fail+0x23c/0x250 [ 2954.512247][T30946] ? sock_common_setsockopt+0x5d/0x70 [ 2954.517764][T30946] __should_failslab+0x81/0x90 [ 2954.522593][T30946] should_failslab+0x5/0x20 [ 2954.527164][T30946] __kmalloc_track_caller+0x6d/0x370 [ 2954.532464][T30946] sctp_setsockopt+0x8e/0x8870 [ 2954.537236][T30946] sock_common_setsockopt+0x5d/0x70 [ 2954.542491][T30946] ? sock_common_recvmsg+0xe0/0xe0 [ 2954.547613][T30946] __sys_setsockopt+0x209/0x2a0 [ 2954.552520][T30946] __x64_sys_setsockopt+0x62/0x70 [ 2954.557599][T30946] do_syscall_64+0x44/0xd0 [ 2954.562022][T30946] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2954.568096][T30946] RIP: 0033:0x7f4b20a29ae9 [ 2954.572511][T30946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2954.592163][T30946] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2954.600586][T30946] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:23 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 2) [ 2954.608590][T30946] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2954.616561][T30946] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2954.624533][T30946] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2954.632669][T30946] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2954.640834][T30946] [ 2954.645774][T30418] device syz_tun left promiscuous mode [ 2954.679440][T30418] device ip6gretap0 left promiscuous mode [ 2954.711250][T30418] bridge0: port 2(bridge_slave_1) entered disabled state [ 2954.718378][T30418] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x400300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2954.725563][T30418] device bridge0 left promiscuous mode [ 2954.748969][T30466] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2954.766096][T30471] device Y4`Ҙ left promiscuous mode [ 2954.805637][T30471] device tunl0 left promiscuous mode [ 2954.824527][T30471] device gre0 left promiscuous mode [ 2954.848294][T31327] FAULT_INJECTION: forcing a failure. [ 2954.848294][T31327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2954.861768][T31327] CPU: 0 PID: 31327 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2954.871579][T31327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.881645][T31327] Call Trace: [ 2954.884928][T31327] [ 2954.887866][T31327] dump_stack_lvl+0xd6/0x122 [ 2954.892464][T31327] dump_stack+0x11/0x1b [ 2954.896637][T31327] should_fail+0x23c/0x250 [ 2954.901142][T31327] should_fail_usercopy+0x16/0x20 [ 2954.906240][T31327] _copy_from_user+0x1c/0xd0 [ 2954.910913][T31327] sctp_setsockopt+0xd8/0x8870 [ 2954.915754][T31327] sock_common_setsockopt+0x5d/0x70 [ 2954.921049][T31327] ? sock_common_recvmsg+0xe0/0xe0 [ 2954.926180][T31327] __sys_setsockopt+0x209/0x2a0 [ 2954.931045][T31327] __x64_sys_setsockopt+0x62/0x70 [ 2954.936126][T31327] do_syscall_64+0x44/0xd0 [ 2954.940633][T31327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2954.946640][T31327] RIP: 0033:0x7f4b20a29ae9 [ 2954.951076][T31327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2954.970744][T31327] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2954.979166][T31327] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2954.987157][T31327] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2954.995142][T31327] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2955.003126][T31327] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2955.011124][T31327] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2955.019111][T31327] [ 2955.077665][T30471] device gretap0 left promiscuous mode [ 2955.108378][T30471] device erspan0 left promiscuous mode [ 2955.141012][T30471] device ip_vti0 left promiscuous mode [ 2955.159251][T30471] device ip6_vti0 left promiscuous mode [ 2955.188650][T30471] device sit0 left promiscuous mode [ 2955.389694][T30471] device ip6tnl0 left promiscuous mode [ 2955.418905][T30471] device ip6gre0 left promiscuous mode [ 2955.619259][T30471] device syz_tun left promiscuous mode [ 2955.647860][T30471] device ip6gretap0 left promiscuous mode [ 2955.677373][T30471] bridge0: port 2(bridge_slave_1) entered disabled state [ 2955.684460][T30471] bridge0: port 1(bridge_slave_0) entered disabled state [ 2955.691612][T30471] device bridge0 left promiscuous mode 05:52:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe08, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:24 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 3) [ 2955.727117][T31329] device Y4`Ҙ entered promiscuous mode [ 2955.733544][T31329] device tunl0 entered promiscuous mode [ 2955.739811][T31329] device gre0 entered promiscuous mode [ 2955.745759][T31329] device gretap0 entered promiscuous mode [ 2955.752030][T31329] device erspan0 entered promiscuous mode [ 2955.758608][T31329] device ip_vti0 entered promiscuous mode [ 2955.764938][T31329] device ip6_vti0 entered promiscuous mode [ 2955.771303][T31329] device sit0 entered promiscuous mode [ 2955.777348][T31329] device ip6tnl0 entered promiscuous mode [ 2955.783812][T31329] device ip6gre0 entered promiscuous mode [ 2955.789990][T31329] device syz_tun entered promiscuous mode [ 2955.796322][T31329] device ip6gretap0 entered promiscuous mode [ 2955.796814][T31333] FAULT_INJECTION: forcing a failure. [ 2955.796814][T31333] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.802908][T31329] device bridge0 entered promiscuous mode [ 2955.815130][T31333] CPU: 1 PID: 31333 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2955.823801][T31335] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2955.830676][T31333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.830742][T31333] Call Trace: [ 2955.830749][T31333] [ 2955.856326][T31333] dump_stack_lvl+0xd6/0x122 [ 2955.860929][T31333] dump_stack+0x11/0x1b [ 2955.865087][T31333] should_fail+0x23c/0x250 [ 2955.869508][T31333] ? sctp_get_port_local+0x45d/0xac0 05:52:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe0c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x1000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2955.874907][T31333] __should_failslab+0x81/0x90 [ 2955.879674][T31333] should_failslab+0x5/0x20 [ 2955.884210][T31333] kmem_cache_alloc+0x4f/0x320 [ 2955.889171][T31333] sctp_get_port_local+0x45d/0xac0 [ 2955.894323][T31333] sctp_do_bind+0x3c2/0x5e0 [ 2955.898891][T31333] sctp_connect_new_asoc+0x156/0x3a0 [ 2955.904165][T31333] __sctp_connect+0x416/0xa80 [ 2955.908824][T31333] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2955.915059][T31333] sctp_setsockopt+0x2e29/0x8870 [ 2955.920019][T31333] sock_common_setsockopt+0x5d/0x70 [ 2955.925204][T31333] ? sock_common_recvmsg+0xe0/0xe0 [ 2955.930375][T31333] __sys_setsockopt+0x209/0x2a0 [ 2955.935296][T31333] __x64_sys_setsockopt+0x62/0x70 [ 2955.940394][T31333] do_syscall_64+0x44/0xd0 [ 2955.944793][T31333] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2955.950855][T31333] RIP: 0033:0x7f4b20a29ae9 [ 2955.955306][T31333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 4) 05:52:24 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2955.975034][T31333] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2955.983480][T31333] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2955.991516][T31333] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2955.999519][T31333] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2956.007532][T31333] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2956.015504][T31333] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2956.023503][T31333] 05:52:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2956.189588][T31544] device Y4`Ҙ entered promiscuous mode [ 2956.198999][T31544] device tunl0 entered promiscuous mode [ 2956.206039][T31544] device gre0 entered promiscuous mode [ 2956.216508][T31544] device gretap0 entered promiscuous mode [ 2956.225377][T31544] device erspan0 entered promiscuous mode [ 2956.235439][T31544] device ip_vti0 entered promiscuous mode [ 2956.245258][T31544] device ip6_vti0 entered promiscuous mode [ 2956.255378][T31544] device sit0 entered promiscuous mode [ 2956.263362][T31544] device ip6tnl0 entered promiscuous mode [ 2956.271947][T31544] device ip6gre0 entered promiscuous mode [ 2956.280238][T31544] device syz_tun entered promiscuous mode [ 2956.288539][T31544] device ip6gretap0 entered promiscuous mode [ 2956.297250][T31552] FAULT_INJECTION: forcing a failure. [ 2956.297250][T31552] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.299385][T31544] device bridge0 entered promiscuous mode [ 2956.310245][T31552] CPU: 1 PID: 31552 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2956.310275][T31552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.310288][T31552] Call Trace: [ 2956.310295][T31552] [ 2956.319955][T31553] device Y4`Ҙ left promiscuous mode [ 2956.325804][T31552] dump_stack_lvl+0xd6/0x122 [ 2956.325830][T31552] dump_stack+0x11/0x1b [ 2956.325845][T31552] should_fail+0x23c/0x250 [ 2956.336744][T31553] device tunl0 left promiscuous mode [ 2956.339492][T31552] ? sctp_add_bind_addr+0x73/0x210 [ 2956.343050][T31553] device gre0 left promiscuous mode [ 2956.347957][T31552] __should_failslab+0x81/0x90 [ 2956.353029][T31553] device gretap0 left promiscuous mode [ 2956.356671][T31552] should_failslab+0x5/0x20 [ 2956.356695][T31552] kmem_cache_alloc_trace+0x52/0x350 [ 2956.361538][T31553] device erspan0 left promiscuous mode [ 2956.366361][T31552] sctp_add_bind_addr+0x73/0x210 [ 2956.366383][T31552] sctp_do_bind+0x54d/0x5e0 [ 2956.372047][T31553] device ip_vti0 left promiscuous mode [ 2956.376781][T31552] sctp_connect_new_asoc+0x156/0x3a0 [ 2956.382140][T31553] device ip6_vti0 left promiscuous mode [ 2956.386980][T31552] __sctp_connect+0x416/0xa80 [ 2956.387004][T31552] sctp_setsockopt+0x2e29/0x8870 [ 2956.392030][T31553] device sit0 left promiscuous mode [ 2956.396790][T31552] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2956.402914][T31553] device ip6tnl0 left promiscuous mode [ 2956.407285][T31552] sock_common_setsockopt+0x5d/0x70 [ 2956.407309][T31552] ? sock_common_recvmsg+0xe0/0xe0 [ 2956.412346][T31553] device ip6gre0 left promiscuous mode [ 2956.417272][T31552] __sys_setsockopt+0x209/0x2a0 [ 2956.422998][T31553] device syz_tun left promiscuous mode [ 2956.428083][T31552] __x64_sys_setsockopt+0x62/0x70 05:52:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe10, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2956.433159][T31553] device ip6gretap0 left promiscuous mode [ 2956.437699][T31552] do_syscall_64+0x44/0xd0 [ 2956.437720][T31552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2956.443436][T31553] device bridge0 left promiscuous mode [ 2956.449045][T31552] RIP: 0033:0x7f4b20a29ae9 [ 2956.449063][T31552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.456085][T31551] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:25 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2956.459758][T31552] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2956.459816][T31552] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2956.459827][T31552] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2956.459840][T31552] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2956.459852][T31552] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2956.580945][T31552] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x2100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x2000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 5) [ 2956.588929][T31552] 05:52:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xb00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2956.824292][T31873] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2956.842313][T31971] FAULT_INJECTION: forcing a failure. [ 2956.842313][T31971] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.855427][T31971] CPU: 0 PID: 31971 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 05:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x3000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe14, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2956.865264][T31971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.875467][T31971] Call Trace: [ 2956.878739][T31971] [ 2956.881662][T31971] dump_stack_lvl+0xd6/0x122 [ 2956.886283][T31971] dump_stack+0x11/0x1b [ 2956.890445][T31971] should_fail+0x23c/0x250 [ 2956.894904][T31971] ? sctp_association_new+0x70/0x10d0 [ 2956.900283][T31971] __should_failslab+0x81/0x90 [ 2956.905103][T31971] should_failslab+0x5/0x20 [ 2956.909638][T31971] kmem_cache_alloc_trace+0x52/0x350 [ 2956.914932][T31971] ? sysvec_apic_timer_interrupt+0x4a/0xb0 05:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4788}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2956.920813][T31971] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2956.926972][T31971] sctp_association_new+0x70/0x10d0 [ 2956.932241][T31971] ? sctp_scope+0x13/0x50 [ 2956.936570][T31971] ? __ipv6_addr_type+0x1de/0x200 [ 2956.941607][T31971] sctp_connect_new_asoc+0x1ab/0x3a0 [ 2956.946925][T31971] __sctp_connect+0x416/0xa80 [ 2956.951669][T31971] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2956.957830][T31971] ? sctp_setsockopt+0xf8d/0x8870 [ 2956.963029][T31971] sctp_setsockopt+0x2e29/0x8870 [ 2956.967974][T31971] sock_common_setsockopt+0x5d/0x70 [ 2956.973251][T31971] ? sock_common_recvmsg+0xe0/0xe0 [ 2956.978372][T31971] __sys_setsockopt+0x209/0x2a0 [ 2956.983375][T31971] __x64_sys_setsockopt+0x62/0x70 [ 2956.988443][T31971] do_syscall_64+0x44/0xd0 [ 2956.992901][T31971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2956.998852][T31971] RIP: 0033:0x7f4b20a29ae9 [ 2957.003269][T31971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2957.022893][T31971] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2957.031311][T31971] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2957.035092][T32184] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2957.039288][T31971] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2957.039306][T31971] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2957.039319][T31971] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 05:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe18, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 6) [ 2957.072483][T31971] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2957.080465][T31971] 05:52:25 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xd00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe1c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2957.262773][T32503] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2957.266118][T32502] FAULT_INJECTION: forcing a failure. [ 2957.266118][T32502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2957.285663][T32502] CPU: 1 PID: 32502 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2957.295475][T32502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.305542][T32502] Call Trace: [ 2957.308824][T32502] [ 2957.311824][T32502] dump_stack_lvl+0xd6/0x122 [ 2957.316407][T32502] dump_stack+0x11/0x1b [ 2957.320659][T32502] should_fail+0x23c/0x250 [ 2957.325109][T32502] __alloc_pages+0x102/0x330 [ 2957.329822][T32502] alloc_pages+0x382/0x3d0 [ 2957.334239][T32502] __get_free_pages+0x8/0x30 [ 2957.338827][T32502] __genradix_ptr_alloc+0xf9/0x240 [ 2957.343946][T32502] __genradix_prealloc+0x42/0x90 [ 2957.348869][T32502] sctp_stream_init+0xe5/0x2d0 [ 2957.353647][T32502] sctp_association_new+0xaae/0x10d0 [ 2957.358915][T32502] ? __ipv6_addr_type+0x1de/0x200 [ 2957.364012][T32502] sctp_connect_new_asoc+0x1ab/0x3a0 [ 2957.369291][T32502] __sctp_connect+0x416/0xa80 [ 2957.373954][T32502] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2957.380125][T32502] ? sctp_setsockopt+0xf8d/0x8870 [ 2957.385135][T32502] sctp_setsockopt+0x2e29/0x8870 [ 2957.390188][T32502] sock_common_setsockopt+0x5d/0x70 [ 2957.395428][T32502] ? sock_common_recvmsg+0xe0/0xe0 [ 2957.400574][T32502] __sys_setsockopt+0x209/0x2a0 [ 2957.405411][T32502] __x64_sys_setsockopt+0x62/0x70 [ 2957.410576][T32502] do_syscall_64+0x44/0xd0 [ 2957.414980][T32502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2957.420857][T32502] RIP: 0033:0x7f4b20a29ae9 [ 2957.425307][T32502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2957.445029][T32502] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2957.453499][T32502] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 7) 05:52:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2957.461542][T32502] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2957.469503][T32502] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2957.477516][T32502] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2957.485501][T32502] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2957.493497][T32502] 05:52:26 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2957.662168][T32713] device Y4`Ҙ left promiscuous mode [ 2957.669554][T32713] device tunl0 left promiscuous mode [ 2957.676168][T32713] device gre0 left promiscuous mode [ 2957.684848][T32713] device gretap0 left promiscuous mode [ 2957.694586][T32713] device erspan0 left promiscuous mode [ 2957.704112][T32713] device ip_vti0 left promiscuous mode [ 2957.713677][T32713] device ip6_vti0 left promiscuous mode [ 2957.722016][T32713] device sit0 left promiscuous mode [ 2957.730348][T32713] device ip6tnl0 left promiscuous mode [ 2957.739058][T32713] device ip6gre0 left promiscuous mode [ 2957.748976][T32713] device syz_tun left promiscuous mode [ 2957.756104][T32713] device ip6gretap0 left promiscuous mode [ 2957.766705][T32713] device bridge0 left promiscuous mode [ 2957.770849][T32720] FAULT_INJECTION: forcing a failure. [ 2957.770849][T32720] name failslab, interval 1, probability 0, space 0, times 0 [ 2957.785173][T32720] CPU: 1 PID: 32720 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2957.794993][T32720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.805074][T32720] Call Trace: [ 2957.808363][T32720] [ 2957.811295][T32720] dump_stack_lvl+0xd6/0x122 [ 2957.815891][T32720] dump_stack+0x11/0x1b [ 2957.819199][T32718] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2957.820050][T32720] should_fail+0x23c/0x250 [ 2957.820096][T32720] ? sctp_auth_asoc_copy_shkeys+0xfe/0x360 [ 2957.839617][T32720] __should_failslab+0x81/0x90 [ 2957.844386][T32720] should_failslab+0x5/0x20 [ 2957.848911][T32720] kmem_cache_alloc_trace+0x52/0x350 [ 2957.854208][T32720] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2957.860448][T32720] sctp_auth_asoc_copy_shkeys+0xfe/0x360 05:52:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xe00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2957.866096][T32720] sctp_association_new+0xe22/0x10d0 [ 2957.871387][T32720] sctp_connect_new_asoc+0x1ab/0x3a0 [ 2957.876707][T32720] __sctp_connect+0x416/0xa80 [ 2957.881460][T32720] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2957.887675][T32720] ? sctp_setsockopt+0xf8d/0x8870 [ 2957.892795][T32720] sctp_setsockopt+0x2e29/0x8870 [ 2957.897804][T32720] sock_common_setsockopt+0x5d/0x70 [ 2957.903039][T32720] ? sock_common_recvmsg+0xe0/0xe0 [ 2957.908178][T32720] __sys_setsockopt+0x209/0x2a0 05:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5865}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe20, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2957.913045][T32720] __x64_sys_setsockopt+0x62/0x70 [ 2957.918075][T32720] do_syscall_64+0x44/0xd0 [ 2957.922542][T32720] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2957.928435][T32720] RIP: 0033:0x7f4b20a29ae9 [ 2957.932851][T32720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2957.952648][T32720] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 8) [ 2957.961064][T32720] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2957.969040][T32720] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2957.977005][T32720] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2957.985239][T32720] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2957.993196][T32720] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2958.001182][T32720] 05:52:26 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2958.255599][ T576] FAULT_INJECTION: forcing a failure. [ 2958.255599][ T576] name failslab, interval 1, probability 0, space 0, times 0 [ 2958.268829][ T576] CPU: 1 PID: 576 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2958.278467][ T576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.288599][ T576] Call Trace: [ 2958.291899][ T576] [ 2958.294827][ T576] dump_stack_lvl+0xd6/0x122 [ 2958.299422][ T576] dump_stack+0x11/0x1b [ 2958.303584][ T576] should_fail+0x23c/0x250 [ 2958.308005][ T576] ? sctp_add_bind_addr+0x73/0x210 [ 2958.313118][ T576] __should_failslab+0x81/0x90 [ 2958.317948][ T576] should_failslab+0x5/0x20 [ 2958.322574][ T576] kmem_cache_alloc_trace+0x52/0x350 [ 2958.327935][ T576] ? _raw_spin_unlock_irqrestore+0x15/0x60 [ 2958.333755][ T576] ? preempt_count_add+0x4e/0x90 [ 2958.338703][ T576] ? _raw_spin_lock_irqsave+0x4c/0xa0 [ 2958.344083][ T576] sctp_add_bind_addr+0x73/0x210 [ 2958.349052][ T576] ? sctp_get_af_specific+0x44/0x60 [ 2958.354271][ T576] sctp_copy_local_addr_list+0x1ab/0x230 [ 2958.359920][ T576] sctp_copy_one_addr+0x7d/0x3f0 [ 2958.364854][ T576] ? get_random_bytes+0x65/0x110 [ 2958.369852][ T576] sctp_bind_addr_copy+0x7c/0x280 [ 2958.374877][ T576] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2958.381023][ T576] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2958.386323][ T576] __sctp_connect+0x416/0xa80 [ 2958.391017][ T576] sctp_setsockopt+0x2e29/0x8870 [ 2958.395966][ T576] sock_common_setsockopt+0x5d/0x70 [ 2958.401168][ T576] ? sock_common_recvmsg+0xe0/0xe0 [ 2958.406280][ T576] __sys_setsockopt+0x209/0x2a0 [ 2958.411238][ T576] __x64_sys_setsockopt+0x62/0x70 [ 2958.416269][ T576] do_syscall_64+0x44/0xd0 [ 2958.420680][ T576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2958.426576][ T576] RIP: 0033:0x7f4b20a29ae9 [ 2958.430998][ T576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 9) [ 2958.450740][ T576] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2958.459210][ T576] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2958.467180][ T576] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2958.475151][ T576] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2958.483294][ T576] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2958.491266][ T576] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2958.499238][ T576] 05:52:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:27 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2958.609650][ T578] bridge0: port 2(bridge_slave_1) entered blocking state [ 2958.616898][ T578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2958.624380][ T578] bridge0: port 1(bridge_slave_0) entered blocking state [ 2958.631519][ T578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2958.642652][ T577] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe30, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2958.657159][T28450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x7000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x1100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2958.769546][ T893] FAULT_INJECTION: forcing a failure. [ 2958.769546][ T893] name failslab, interval 1, probability 0, space 0, times 0 [ 2958.782650][ T893] CPU: 1 PID: 893 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2958.792344][ T893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.802410][ T893] Call Trace: [ 2958.805684][ T893] [ 2958.808600][ T893] dump_stack_lvl+0xd6/0x122 [ 2958.813213][ T893] dump_stack+0x11/0x1b [ 2958.817358][ T893] should_fail+0x23c/0x250 [ 2958.821805][ T893] ? sctp_add_bind_addr+0x73/0x210 [ 2958.826924][ T893] __should_failslab+0x81/0x90 [ 2958.831692][ T893] should_failslab+0x5/0x20 [ 2958.836379][ T893] kmem_cache_alloc_trace+0x52/0x350 [ 2958.841713][ T893] ? sctp_v6_scope+0x2e/0x70 [ 2958.846354][ T893] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2958.851611][ T893] sctp_add_bind_addr+0x73/0x210 [ 2958.856563][ T893] sctp_copy_local_addr_list+0x1ab/0x230 [ 2958.862233][ T893] sctp_copy_one_addr+0x7d/0x3f0 [ 2958.867152][ T893] ? get_random_bytes+0x65/0x110 [ 2958.872082][ T893] sctp_bind_addr_copy+0x7c/0x280 [ 2958.877165][ T893] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2958.883219][ T893] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2958.888491][ T893] __sctp_connect+0x416/0xa80 [ 2958.893152][ T893] sctp_setsockopt+0x2e29/0x8870 [ 2958.898085][ T893] sock_common_setsockopt+0x5d/0x70 [ 2958.903264][ T893] ? sock_common_recvmsg+0xe0/0xe0 [ 2958.908377][ T893] __sys_setsockopt+0x209/0x2a0 [ 2958.913227][ T893] __x64_sys_setsockopt+0x62/0x70 [ 2958.918274][ T893] do_syscall_64+0x44/0xd0 [ 2958.922669][ T893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2958.928544][ T893] RIP: 0033:0x7f4b20a29ae9 [ 2958.932939][ T893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2958.952570][ T893] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2958.961349][ T893] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 10) [ 2958.969388][ T893] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2958.977396][ T893] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2958.985348][ T893] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000001 [ 2958.993579][ T893] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2959.001552][ T893] 05:52:27 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe34, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2959.127392][ T1002] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2959.252803][ T1121] FAULT_INJECTION: forcing a failure. [ 2959.252803][ T1121] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.265817][ T1121] CPU: 1 PID: 1121 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2959.275565][ T1121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.285672][ T1121] Call Trace: [ 2959.289040][ T1121] [ 2959.292170][ T1121] dump_stack_lvl+0xd6/0x122 [ 2959.296884][ T1121] dump_stack+0x11/0x1b [ 2959.301036][ T1121] should_fail+0x23c/0x250 [ 2959.305516][ T1121] ? sctp_add_bind_addr+0x73/0x210 [ 2959.310617][ T1121] __should_failslab+0x81/0x90 [ 2959.315386][ T1121] should_failslab+0x5/0x20 [ 2959.320121][ T1121] kmem_cache_alloc_trace+0x52/0x350 [ 2959.325398][ T1121] ? sctp_add_bind_addr+0x73/0x210 [ 2959.330507][ T1121] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2959.335740][ T1121] sctp_add_bind_addr+0x73/0x210 [ 2959.340720][ T1121] sctp_copy_local_addr_list+0x1ab/0x230 [ 2959.346464][ T1121] sctp_copy_one_addr+0x7d/0x3f0 [ 2959.351464][ T1121] sctp_bind_addr_copy+0x7c/0x280 [ 2959.356515][ T1121] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2959.362636][ T1121] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2959.367951][ T1121] __sctp_connect+0x416/0xa80 [ 2959.372632][ T1121] sctp_setsockopt+0x2e29/0x8870 [ 2959.377572][ T1121] sock_common_setsockopt+0x5d/0x70 [ 2959.382775][ T1121] ? sock_common_recvmsg+0xe0/0xe0 [ 2959.387866][ T1121] __sys_setsockopt+0x209/0x2a0 [ 2959.392703][ T1121] __x64_sys_setsockopt+0x62/0x70 [ 2959.397721][ T1121] do_syscall_64+0x44/0xd0 [ 2959.402120][ T1121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2959.407998][ T1121] RIP: 0033:0x7f4b20a29ae9 [ 2959.412409][ T1121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2959.432140][ T1121] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2959.440535][ T1121] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 11) [ 2959.448492][ T1121] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2959.456452][ T1121] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2959.464454][ T1121] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2959.472433][ T1121] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2959.480423][ T1121] 05:52:28 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2959.751962][ T1235] FAULT_INJECTION: forcing a failure. [ 2959.751962][ T1235] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.765047][ T1235] CPU: 1 PID: 1235 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2959.774778][ T1235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.784881][ T1235] Call Trace: [ 2959.788156][ T1235] [ 2959.791073][ T1235] dump_stack_lvl+0xd6/0x122 [ 2959.795672][ T1235] dump_stack+0x11/0x1b [ 2959.799862][ T1235] should_fail+0x23c/0x250 [ 2959.804278][ T1235] ? sctp_add_bind_addr+0x73/0x210 [ 2959.809417][ T1235] __should_failslab+0x81/0x90 [ 2959.814322][ T1235] should_failslab+0x5/0x20 [ 2959.819069][ T1235] kmem_cache_alloc_trace+0x52/0x350 [ 2959.824468][ T1235] ? sctp_add_bind_addr+0x73/0x210 [ 2959.829637][ T1235] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2959.834841][ T1235] sctp_add_bind_addr+0x73/0x210 [ 2959.839764][ T1235] sctp_copy_local_addr_list+0x1ab/0x230 [ 2959.845396][ T1235] sctp_copy_one_addr+0x7d/0x3f0 [ 2959.850319][ T1235] sctp_bind_addr_copy+0x7c/0x280 [ 2959.855396][ T1235] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2959.861453][ T1235] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2959.866771][ T1235] __sctp_connect+0x416/0xa80 [ 2959.871499][ T1235] sctp_setsockopt+0x2e29/0x8870 [ 2959.876496][ T1235] sock_common_setsockopt+0x5d/0x70 [ 2959.881695][ T1235] ? sock_common_recvmsg+0xe0/0xe0 [ 2959.886799][ T1235] __sys_setsockopt+0x209/0x2a0 [ 2959.891715][ T1235] __x64_sys_setsockopt+0x62/0x70 [ 2959.896764][ T1235] do_syscall_64+0x44/0xd0 [ 2959.901224][ T1235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2959.907101][ T1235] RIP: 0033:0x7f4b20a29ae9 [ 2959.911528][ T1235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2959.931139][ T1235] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2959.939543][ T1235] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 12) [ 2959.947680][ T1235] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2959.955634][ T1235] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2959.963610][ T1235] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2959.971620][ T1235] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2959.979637][ T1235] 05:52:28 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000b00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2960.125857][ T1465] FAULT_INJECTION: forcing a failure. [ 2960.125857][ T1465] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.138765][ T1465] CPU: 1 PID: 1465 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2960.148489][ T1465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.158641][ T1465] Call Trace: [ 2960.161929][ T1465] [ 2960.164884][ T1465] dump_stack_lvl+0xd6/0x122 [ 2960.169556][ T1465] dump_stack+0x11/0x1b [ 2960.173716][ T1465] should_fail+0x23c/0x250 [ 2960.178144][ T1465] ? sctp_add_bind_addr+0x73/0x210 [ 2960.183443][ T1465] __should_failslab+0x81/0x90 [ 2960.188225][ T1465] should_failslab+0x5/0x20 [ 2960.192733][ T1465] kmem_cache_alloc_trace+0x52/0x350 [ 2960.198027][ T1465] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2960.203237][ T1465] sctp_add_bind_addr+0x73/0x210 [ 2960.208210][ T1465] sctp_copy_local_addr_list+0x1ab/0x230 [ 2960.213895][ T1465] sctp_copy_one_addr+0x7d/0x3f0 [ 2960.218862][ T1465] ? get_random_bytes+0x65/0x110 [ 2960.223815][ T1465] sctp_bind_addr_copy+0x7c/0x280 [ 2960.228866][ T1465] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2960.234947][ T1465] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2960.240248][ T1465] __sctp_connect+0x416/0xa80 [ 2960.245015][ T1465] sctp_setsockopt+0x2e29/0x8870 [ 2960.249963][ T1465] sock_common_setsockopt+0x5d/0x70 [ 2960.255174][ T1465] ? sock_common_recvmsg+0xe0/0xe0 [ 2960.260296][ T1465] __sys_setsockopt+0x209/0x2a0 [ 2960.265176][ T1465] __x64_sys_setsockopt+0x62/0x70 [ 2960.270215][ T1465] do_syscall_64+0x44/0xd0 [ 2960.274633][ T1465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2960.280532][ T1465] RIP: 0033:0x7f4b20a29ae9 [ 2960.284976][ T1465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2960.304585][ T1465] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2960.313008][ T1465] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 13) [ 2960.320989][ T1465] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2960.328999][ T1465] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2960.336984][ T1465] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2960.345160][ T1465] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2960.353142][ T1465] [ 2960.475322][ T1534] FAULT_INJECTION: forcing a failure. [ 2960.475322][ T1534] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.488685][ T1534] CPU: 1 PID: 1534 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2960.498616][ T1534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.508674][ T1534] Call Trace: [ 2960.511961][ T1534] [ 2960.514892][ T1534] dump_stack_lvl+0xd6/0x122 [ 2960.519523][ T1534] dump_stack+0x11/0x1b [ 2960.523744][ T1534] should_fail+0x23c/0x250 [ 2960.528170][ T1534] ? sctp_add_bind_addr+0x73/0x210 [ 2960.533295][ T1534] __should_failslab+0x81/0x90 [ 2960.538069][ T1534] should_failslab+0x5/0x20 [ 2960.542580][ T1534] kmem_cache_alloc_trace+0x52/0x350 [ 2960.547870][ T1534] ? sctp_v4_cmp_addr+0x6f/0xb0 [ 2960.552784][ T1534] sctp_add_bind_addr+0x73/0x210 [ 2960.557777][ T1534] sctp_copy_local_addr_list+0x1ab/0x230 [ 2960.563435][ T1534] sctp_copy_one_addr+0x7d/0x3f0 [ 2960.568383][ T1534] ? get_random_bytes+0x65/0x110 [ 2960.573415][ T1534] sctp_bind_addr_copy+0x7c/0x280 [ 2960.578505][ T1534] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2960.584611][ T1534] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2960.589903][ T1534] __sctp_connect+0x416/0xa80 [ 2960.594588][ T1534] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2960.600754][ T1534] sctp_setsockopt+0x2e29/0x8870 [ 2960.605777][ T1534] sock_common_setsockopt+0x5d/0x70 [ 2960.611000][ T1534] ? sock_common_recvmsg+0xe0/0xe0 [ 2960.616127][ T1534] __sys_setsockopt+0x209/0x2a0 [ 2960.621002][ T1534] __x64_sys_setsockopt+0x62/0x70 05:52:29 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2960.626036][ T1534] do_syscall_64+0x44/0xd0 [ 2960.630517][ T1534] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2960.636434][ T1534] RIP: 0033:0x7f4b20a29ae9 [ 2960.640849][ T1534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2960.660458][ T1534] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2960.668951][ T1534] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2960.676924][ T1534] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2960.684897][ T1534] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2960.692906][ T1534] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2960.700907][ T1534] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2960.708879][ T1534] [ 2960.774296][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 2960.781447][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6558}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x1200}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 14) 05:52:29 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000d00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe38, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x9000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2960.830049][ T1231] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2960.889029][ T1808] FAULT_INJECTION: forcing a failure. [ 2960.889029][ T1808] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.901744][ T1808] CPU: 0 PID: 1808 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2960.911505][ T1808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.921562][ T1808] Call Trace: [ 2960.924846][ T1808] [ 2960.927829][ T1808] dump_stack_lvl+0xd6/0x122 [ 2960.932483][ T1808] dump_stack+0x11/0x1b [ 2960.936639][ T1808] should_fail+0x23c/0x250 [ 2960.941125][ T1808] ? sctp_add_bind_addr+0x73/0x210 [ 2960.946254][ T1808] __should_failslab+0x81/0x90 [ 2960.951024][ T1808] should_failslab+0x5/0x20 [ 2960.955529][ T1808] kmem_cache_alloc_trace+0x52/0x350 [ 2960.960830][ T1808] ? sctp_add_bind_addr+0x73/0x210 [ 2960.965951][ T1808] sctp_add_bind_addr+0x73/0x210 [ 2960.970891][ T1808] sctp_copy_local_addr_list+0x1ab/0x230 [ 2960.976530][ T1808] sctp_copy_one_addr+0x7d/0x3f0 [ 2960.981478][ T1818] device Y4`Ҙ entered promiscuous mode [ 2960.981508][ T1808] ? get_random_bytes+0x65/0x110 [ 2960.988077][ T1818] device tunl0 entered promiscuous mode [ 2960.992238][ T1808] sctp_bind_addr_copy+0x7c/0x280 [ 2960.998547][ T1818] device gre0 entered promiscuous mode [ 2961.002778][ T1808] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2961.008921][ T1818] device gretap0 entered promiscuous mode [ 2961.014361][ T1808] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2961.014386][ T1808] __sctp_connect+0x416/0xa80 [ 2961.020756][ T1818] device erspan0 entered promiscuous mode [ 2961.025343][ T1808] sctp_setsockopt+0x2e29/0x8870 [ 2961.030684][ T1818] device ip_vti0 entered promiscuous mode [ 2961.035679][ T1808] sock_common_setsockopt+0x5d/0x70 [ 2961.041399][ T1818] device ip6_vti0 entered promiscuous mode [ 2961.046293][ T1808] ? sock_common_recvmsg+0xe0/0xe0 [ 2961.052206][ T1818] device sit0 entered promiscuous mode [ 2961.057241][ T1808] __sys_setsockopt+0x209/0x2a0 [ 2961.057267][ T1808] __x64_sys_setsockopt+0x62/0x70 [ 2961.063090][ T1818] device ip6tnl0 entered promiscuous mode [ 2961.067888][ T1808] do_syscall_64+0x44/0xd0 [ 2961.067917][ T1808] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2961.073488][ T1818] device ip6gre0 entered promiscuous mode [ 2961.077748][ T1808] RIP: 0033:0x7f4b20a29ae9 [ 2961.077767][ T1808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2961.084195][ T1818] device syz_tun entered promiscuous mode [ 2961.087875][ T1808] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 05:52:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 15) 05:52:29 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2961.094292][ T1818] device ip6gretap0 entered promiscuous mode [ 2961.099461][ T1808] ORIG_RAX: 0000000000000036 [ 2961.099469][ T1808] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2961.104576][ T1818] device bridge0 entered promiscuous mode [ 2961.123559][ T1808] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2961.123574][ T1808] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2961.123587][ T1808] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2961.123600][ T1808] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2961.123617][ T1808] 05:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xa000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe3c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2961.287936][ T2038] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2961.415621][ T2150] FAULT_INJECTION: forcing a failure. [ 2961.415621][ T2150] name failslab, interval 1, probability 0, space 0, times 0 [ 2961.428646][ T2150] CPU: 0 PID: 2150 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2961.438431][ T2150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2961.448556][ T2150] Call Trace: [ 2961.451838][ T2150] [ 2961.454769][ T2150] dump_stack_lvl+0xd6/0x122 [ 2961.459370][ T2150] dump_stack+0x11/0x1b [ 2961.463557][ T2150] should_fail+0x23c/0x250 [ 2961.468025][ T2150] ? sctp_add_bind_addr+0x73/0x210 [ 2961.473139][ T2150] __should_failslab+0x81/0x90 [ 2961.477911][ T2150] should_failslab+0x5/0x20 [ 2961.482456][ T2150] kmem_cache_alloc_trace+0x52/0x350 [ 2961.483303][ T2244] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2961.487744][ T2150] ? sctp_v4_cmp_addr+0x7c/0xb0 [ 2961.487771][ T2150] sctp_add_bind_addr+0x73/0x210 [ 2961.506785][ T2150] sctp_copy_local_addr_list+0x1ab/0x230 [ 2961.512430][ T2150] sctp_copy_one_addr+0x7d/0x3f0 [ 2961.517374][ T2150] sctp_bind_addr_copy+0x7c/0x280 [ 2961.522403][ T2150] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2961.528501][ T2150] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2961.533821][ T2150] __sctp_connect+0x416/0xa80 [ 2961.538518][ T2150] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2961.544761][ T2150] ? sctp_setsockopt+0xf8d/0x8870 [ 2961.549881][ T2150] sctp_setsockopt+0x2e29/0x8870 [ 2961.554954][ T2150] sock_common_setsockopt+0x5d/0x70 [ 2961.560160][ T2150] ? sock_common_recvmsg+0xe0/0xe0 [ 2961.565279][ T2150] __sys_setsockopt+0x209/0x2a0 [ 2961.570218][ T2150] __x64_sys_setsockopt+0x62/0x70 [ 2961.575271][ T2150] do_syscall_64+0x44/0xd0 [ 2961.579687][ T2150] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2961.585581][ T2150] RIP: 0033:0x7f4b20a29ae9 [ 2961.589996][ T2150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:30 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8847}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe40, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2961.609600][ T2150] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2961.618018][ T2150] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2961.626026][ T2150] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2961.633999][ T2150] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2961.641992][ T2150] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2961.650020][ T2150] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2961.658024][ T2150] 05:52:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 16) [ 2961.677638][ T2466] device Y4`Ҙ left promiscuous mode [ 2961.696590][ T2466] device tunl0 left promiscuous mode [ 2961.713091][ T2466] device gre0 left promiscuous mode 05:52:30 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000001100000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2961.785395][ T2466] device gretap0 left promiscuous mode [ 2961.800470][ T2466] device erspan0 left promiscuous mode [ 2961.813010][ T2466] device ip_vti0 left promiscuous mode [ 2961.826668][ T2466] device ip6_vti0 left promiscuous mode [ 2961.830801][ T2579] FAULT_INJECTION: forcing a failure. [ 2961.830801][ T2579] name failslab, interval 1, probability 0, space 0, times 0 [ 2961.844751][ T2466] device sit0 left promiscuous mode [ 2961.845406][ T2579] CPU: 1 PID: 2579 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2961.860271][ T2579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2961.870327][ T2579] Call Trace: [ 2961.873599][ T2579] [ 2961.876522][ T2579] dump_stack_lvl+0xd6/0x122 [ 2961.881197][ T2579] dump_stack+0x11/0x1b [ 2961.885478][ T2579] should_fail+0x23c/0x250 [ 2961.890025][ T2579] ? sctp_add_bind_addr+0x73/0x210 [ 2961.895134][ T2579] __should_failslab+0x81/0x90 [ 2961.899964][ T2579] should_failslab+0x5/0x20 [ 2961.904473][ T2579] kmem_cache_alloc_trace+0x52/0x350 [ 2961.909829][ T2579] ? sctp_v4_cmp_addr+0x25/0xb0 [ 2961.914702][ T2579] sctp_add_bind_addr+0x73/0x210 [ 2961.919674][ T2579] sctp_copy_local_addr_list+0x1ab/0x230 [ 2961.925306][ T2579] sctp_copy_one_addr+0x7d/0x3f0 [ 2961.928896][ T2466] device ip6tnl0 left promiscuous mode [ 2961.930240][ T2579] ? get_random_bytes+0x65/0x110 [ 2961.940638][ T2579] sctp_bind_addr_copy+0x7c/0x280 [ 2961.945716][ T2579] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2961.946806][ T2466] device ip6gre0 left promiscuous mode [ 2961.951786][ T2579] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2961.951813][ T2579] __sctp_connect+0x416/0xa80 [ 2961.967265][ T2579] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2961.973497][ T2579] sctp_setsockopt+0x2e29/0x8870 [ 2961.978525][ T2579] ? sock_common_setsockopt+0x2c/0x70 [ 2961.983954][ T2579] sock_common_setsockopt+0x5d/0x70 [ 2961.989187][ T2579] ? sock_common_recvmsg+0xe0/0xe0 [ 2961.994301][ T2579] __sys_setsockopt+0x209/0x2a0 [ 2961.999158][ T2579] __x64_sys_setsockopt+0x62/0x70 [ 2962.004238][ T2579] do_syscall_64+0x44/0xd0 [ 2962.008726][ T2579] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2962.014622][ T2579] RIP: 0033:0x7f4b20a29ae9 [ 2962.019031][ T2579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2962.038698][ T2579] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2962.041596][ T2466] device syz_tun left promiscuous mode [ 2962.047203][ T2579] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2962.047218][ T2579] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2962.047232][ T2579] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2962.047246][ T2579] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 05:52:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 17) [ 2962.047260][ T2579] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2962.064570][ T2466] device ip6gretap0 left promiscuous mode [ 2962.068664][ T2579] [ 2962.109490][ T2466] bridge0: port 2(bridge_slave_1) entered blocking state [ 2962.116697][ T2466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2962.124290][ T2466] bridge0: port 1(bridge_slave_0) entered blocking state 05:52:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2500}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2962.131558][ T2466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2962.139129][ T2466] device bridge0 left promiscuous mode [ 2962.154485][T32453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2962.168596][ T2578] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe44, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2962.181874][ T2594] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:30 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000001200000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8848}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2962.304546][ T2888] FAULT_INJECTION: forcing a failure. [ 2962.304546][ T2888] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.317359][ T2888] CPU: 0 PID: 2888 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2962.327063][ T2888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.337166][ T2888] Call Trace: [ 2962.340454][ T2888] [ 2962.343382][ T2888] dump_stack_lvl+0xd6/0x122 [ 2962.348039][ T2888] dump_stack+0x11/0x1b [ 2962.352325][ T2888] should_fail+0x23c/0x250 [ 2962.356778][ T2888] ? sctp_add_bind_addr+0x73/0x210 [ 2962.361897][ T2888] __should_failslab+0x81/0x90 [ 2962.366676][ T2888] should_failslab+0x5/0x20 [ 2962.371190][ T2888] kmem_cache_alloc_trace+0x52/0x350 [ 2962.376481][ T2888] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2962.382663][ T2888] sctp_add_bind_addr+0x73/0x210 [ 2962.387607][ T2888] sctp_copy_local_addr_list+0x1ab/0x230 [ 2962.393248][ T2888] sctp_copy_one_addr+0x7d/0x3f0 [ 2962.398250][ T2888] ? get_random_bytes+0x65/0x110 05:52:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4788}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2962.403258][ T2888] sctp_bind_addr_copy+0x7c/0x280 [ 2962.408369][ T2888] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2962.414513][ T2888] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2962.415652][ T2897] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2962.419809][ T2888] __sctp_connect+0x416/0xa80 [ 2962.419839][ T2888] sctp_setsockopt+0x2e29/0x8870 [ 2962.419860][ T2888] ? security_socket_setsockopt+0x50/0x90 [ 2962.444491][ T2888] sock_common_setsockopt+0x5d/0x70 [ 2962.449779][ T2888] ? sock_common_recvmsg+0xe0/0xe0 05:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x10000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe48, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2962.454899][ T2888] __sys_setsockopt+0x209/0x2a0 [ 2962.459803][ T2888] __x64_sys_setsockopt+0x62/0x70 [ 2962.464838][ T2888] do_syscall_64+0x44/0xd0 [ 2962.469266][ T2888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2962.475166][ T2888] RIP: 0033:0x7f4b20a29ae9 [ 2962.479612][ T2888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:31 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000001d00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 18) [ 2962.499263][ T2888] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2962.507682][ T2888] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2962.515828][ T2888] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2962.523792][ T2888] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2962.531789][ T2888] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2962.539841][ T2888] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2962.547819][ T2888] [ 2962.710293][ T3121] FAULT_INJECTION: forcing a failure. [ 2962.710293][ T3121] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.723168][ T3121] CPU: 0 PID: 3121 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2962.732893][ T3121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.743022][ T3121] Call Trace: [ 2962.746305][ T3121] [ 2962.749237][ T3121] dump_stack_lvl+0xd6/0x122 [ 2962.753829][ T3121] dump_stack+0x11/0x1b [ 2962.758004][ T3121] should_fail+0x23c/0x250 [ 2962.762447][ T3121] ? sctp_add_bind_addr+0x73/0x210 [ 2962.767562][ T3121] __should_failslab+0x81/0x90 [ 2962.772331][ T3121] should_failslab+0x5/0x20 [ 2962.776868][ T3121] kmem_cache_alloc_trace+0x52/0x350 [ 2962.782160][ T3121] ? sctp_v4_cmp_addr+0x40/0xb0 [ 2962.787047][ T3121] sctp_add_bind_addr+0x73/0x210 [ 2962.791987][ T3121] sctp_copy_local_addr_list+0x1ab/0x230 [ 2962.797722][ T3121] sctp_copy_one_addr+0x7d/0x3f0 [ 2962.802732][ T3121] sctp_bind_addr_copy+0x7c/0x280 [ 2962.807795][ T3121] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2962.813872][ T3121] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2962.819187][ T3121] __sctp_connect+0x416/0xa80 [ 2962.823904][ T3121] sctp_setsockopt+0x2e29/0x8870 [ 2962.828855][ T3121] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2962.835016][ T3121] ? sock_common_recvmsg+0xe0/0xe0 [ 2962.840219][ T3121] sock_common_setsockopt+0x5d/0x70 [ 2962.845477][ T3121] ? sock_common_recvmsg+0xe0/0xe0 [ 2962.850596][ T3121] __sys_setsockopt+0x209/0x2a0 [ 2962.855635][ T3121] __x64_sys_setsockopt+0x62/0x70 05:52:31 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2962.860690][ T3121] do_syscall_64+0x44/0xd0 [ 2962.865117][ T3121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2962.871013][ T3121] RIP: 0033:0x7f4b20a29ae9 [ 2962.875427][ T3121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2962.895042][ T3121] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 19) 05:52:31 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000002100000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2962.903449][ T3121] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2962.911602][ T3121] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2962.919755][ T3121] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2962.927732][ T3121] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2962.935706][ T3121] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2962.943691][ T3121] [ 2963.062749][ T3339] FAULT_INJECTION: forcing a failure. [ 2963.062749][ T3339] name failslab, interval 1, probability 0, space 0, times 0 [ 2963.075516][ T3339] CPU: 0 PID: 3339 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2963.085234][ T3339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2963.095297][ T3339] Call Trace: [ 2963.098568][ T3339] [ 2963.101500][ T3339] dump_stack_lvl+0xd6/0x122 [ 2963.106098][ T3339] dump_stack+0x11/0x1b 05:52:31 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000032200000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2963.110251][ T3339] should_fail+0x23c/0x250 [ 2963.114682][ T3339] ? sctp_add_bind_addr+0x73/0x210 [ 2963.119802][ T3339] __should_failslab+0x81/0x90 [ 2963.124576][ T3339] should_failslab+0x5/0x20 [ 2963.129125][ T3339] kmem_cache_alloc_trace+0x52/0x350 [ 2963.134416][ T3339] ? sctp_v4_cmp_addr+0x4e/0xb0 [ 2963.139339][ T3339] sctp_add_bind_addr+0x73/0x210 [ 2963.144270][ T3339] sctp_copy_local_addr_list+0x1ab/0x230 [ 2963.149921][ T3339] sctp_copy_one_addr+0x7d/0x3f0 [ 2963.154869][ T3339] ? get_random_bytes+0x65/0x110 05:52:31 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000022800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2963.159894][ T3339] sctp_bind_addr_copy+0x7c/0x280 [ 2963.164985][ T3339] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2963.171081][ T3339] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2963.176461][ T3339] __sctp_connect+0x416/0xa80 [ 2963.181142][ T3339] sctp_setsockopt+0x2e29/0x8870 [ 2963.186110][ T3339] sock_common_setsockopt+0x5d/0x70 [ 2963.191320][ T3339] ? sock_common_recvmsg+0xe0/0xe0 [ 2963.196442][ T3339] __sys_setsockopt+0x209/0x2a0 [ 2963.201319][ T3339] __x64_sys_setsockopt+0x62/0x70 [ 2963.206433][ T3339] do_syscall_64+0x44/0xd0 [ 2963.210933][ T3339] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2963.216833][ T3339] RIP: 0033:0x7f4b20a29ae9 [ 2963.221389][ T3339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2963.241163][ T3339] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2963.249792][ T3339] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:31 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000002900000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2963.257768][ T3339] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2963.265747][ T3339] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2963.273917][ T3339] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2963.281896][ T3339] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2963.290015][ T3339] [ 2963.783267][ T2911] bridge0: port 2(bridge_slave_1) entered disabled state [ 2963.790393][ T2911] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc305}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4800}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x21000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe4c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 20) 05:52:32 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000022a00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2963.831356][ T3115] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2963.846688][ T3965] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2963.899156][ T3987] FAULT_INJECTION: forcing a failure. [ 2963.899156][ T3987] name failslab, interval 1, probability 0, space 0, times 0 [ 2963.911880][ T3987] CPU: 0 PID: 3987 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2963.921621][ T3987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2963.931728][ T3987] Call Trace: [ 2963.935008][ T3987] [ 2963.937939][ T3987] dump_stack_lvl+0xd6/0x122 [ 2963.942538][ T3987] dump_stack+0x11/0x1b [ 2963.946723][ T3987] should_fail+0x23c/0x250 [ 2963.951250][ T3987] ? sctp_add_bind_addr+0x73/0x210 [ 2963.956430][ T3987] __should_failslab+0x81/0x90 [ 2963.961403][ T3987] should_failslab+0x5/0x20 [ 2963.965911][ T3987] kmem_cache_alloc_trace+0x52/0x350 [ 2963.971226][ T3987] ? sctp_add_bind_addr+0x73/0x210 [ 2963.976384][ T3987] sctp_add_bind_addr+0x73/0x210 [ 2963.981395][ T3987] sctp_copy_local_addr_list+0x1ab/0x230 [ 2963.987131][ T3987] sctp_copy_one_addr+0x7d/0x3f0 [ 2963.992074][ T3987] ? get_random_bytes+0x65/0x110 [ 2963.997180][ T3987] sctp_bind_addr_copy+0x7c/0x280 [ 2964.002240][ T3987] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2964.008320][ T3987] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2964.013633][ T3987] __sctp_connect+0x416/0xa80 [ 2964.018391][ T3987] sctp_setsockopt+0x2e29/0x8870 [ 2964.022687][ T4113] device Y4`Ҙ entered promiscuous mode [ 2964.023329][ T3987] sock_common_setsockopt+0x5d/0x70 [ 2964.031735][ T4113] device tunl0 entered promiscuous mode [ 2964.034292][ T3987] ? sock_common_recvmsg+0xe0/0xe0 [ 2964.042159][ T4113] device gre0 entered promiscuous mode [ 2964.044900][ T3987] __sys_setsockopt+0x209/0x2a0 [ 2964.055197][ T3987] __x64_sys_setsockopt+0x62/0x70 [ 2964.060275][ T3987] do_syscall_64+0x44/0xd0 [ 2964.064768][ T3987] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2964.067302][ T4113] device gretap0 entered promiscuous mode [ 2964.070701][ T3987] RIP: 0033:0x7f4b20a29ae9 05:52:32 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000003200000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2964.070718][ T3987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2964.078708][ T4113] device erspan0 entered promiscuous mode [ 2964.080798][ T3987] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2964.080819][ T3987] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2964.080833][ T3987] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2964.080846][ T3987] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2964.080859][ T3987] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 05:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x29000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2964.102810][ T4113] device ip_vti0 entered promiscuous mode [ 2964.106316][ T3987] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2964.116927][ T4113] device ip6_vti0 entered promiscuous mode [ 2964.122672][ T3987] [ 2964.132772][ T4113] device sit0 entered promiscuous mode 05:52:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 21) [ 2964.193967][ T4113] device ip6tnl0 entered promiscuous mode [ 2964.202285][ T4113] device ip6gre0 entered promiscuous mode [ 2964.225009][ T4113] device syz_tun entered promiscuous mode [ 2964.233147][ T4113] device ip6gretap0 entered promiscuous mode [ 2964.241223][ T4113] bridge0: port 2(bridge_slave_1) entered blocking state [ 2964.248284][ T4113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2964.255811][ T4113] bridge0: port 1(bridge_slave_0) entered blocking state [ 2964.262845][ T4113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2964.270293][ T4113] device bridge0 entered promiscuous mode [ 2964.277815][ T4116] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe50, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xd50b}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2964.289168][ T4120] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2964.481317][ T4349] FAULT_INJECTION: forcing a failure. [ 2964.481317][ T4349] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.494452][ T4349] CPU: 0 PID: 4349 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2964.504265][ T4349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.514334][ T4349] Call Trace: [ 2964.517612][ T4349] [ 2964.520543][ T4349] dump_stack_lvl+0xd6/0x122 [ 2964.525206][ T4349] dump_stack+0x11/0x1b [ 2964.529363][ T4349] should_fail+0x23c/0x250 [ 2964.533790][ T4349] ? sctp_add_bind_addr+0x73/0x210 [ 2964.538989][ T4349] __should_failslab+0x81/0x90 [ 2964.543757][ T4349] should_failslab+0x5/0x20 [ 2964.548263][ T4349] kmem_cache_alloc_trace+0x52/0x350 [ 2964.553563][ T4349] ? sctp_add_bind_addr+0x73/0x210 [ 2964.558682][ T4349] sctp_add_bind_addr+0x73/0x210 [ 2964.563621][ T4349] sctp_copy_local_addr_list+0x1ab/0x230 [ 2964.569290][ T4349] sctp_copy_one_addr+0x7d/0x3f0 [ 2964.574230][ T4349] ? get_random_bytes+0x65/0x110 05:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x3b4e0000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4c00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2964.579209][ T4349] sctp_bind_addr_copy+0x7c/0x280 [ 2964.584256][ T4349] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2964.585668][ T4410] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2964.590360][ T4349] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2964.604933][ T4349] __sctp_connect+0x416/0xa80 [ 2964.609672][ T4349] sctp_setsockopt+0x2e29/0x8870 [ 2964.614622][ T4349] sock_common_setsockopt+0x5d/0x70 [ 2964.619834][ T4349] ? sock_common_recvmsg+0xe0/0xe0 [ 2964.625050][ T4349] __sys_setsockopt+0x209/0x2a0 05:52:33 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2964.629958][ T4349] __x64_sys_setsockopt+0x62/0x70 [ 2964.635032][ T4349] do_syscall_64+0x44/0xd0 [ 2964.639455][ T4349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2964.645354][ T4349] RIP: 0033:0x7f4b20a29ae9 [ 2964.649811][ T4349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2964.669511][ T4349] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xd70b}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe54, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 22) [ 2964.677927][ T4349] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2964.685966][ T4349] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2964.693991][ T4349] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2964.701998][ T4349] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2964.709960][ T4349] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2964.717937][ T4349] 05:52:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5865}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x60000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2964.934858][ T4892] FAULT_INJECTION: forcing a failure. [ 2964.934858][ T4892] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.947797][ T4892] CPU: 1 PID: 4892 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2964.955068][ T4788] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2964.957585][ T4892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.976964][ T4892] Call Trace: [ 2964.980278][ T4892] [ 2964.983205][ T4892] dump_stack_lvl+0xd6/0x122 [ 2964.987943][ T4892] dump_stack+0x11/0x1b [ 2964.992096][ T4892] should_fail+0x23c/0x250 [ 2964.996515][ T4892] ? sctp_add_bind_addr+0x73/0x210 [ 2965.001705][ T4892] __should_failslab+0x81/0x90 [ 2965.006550][ T4892] should_failslab+0x5/0x20 [ 2965.011054][ T4892] kmem_cache_alloc_trace+0x52/0x350 [ 2965.016430][ T4892] ? sctp_v4_cmp_addr+0x7c/0xb0 [ 2965.021353][ T4892] sctp_add_bind_addr+0x73/0x210 [ 2965.026291][ T4892] sctp_copy_local_addr_list+0x1ab/0x230 [ 2965.031926][ T4892] sctp_copy_one_addr+0x7d/0x3f0 [ 2965.036867][ T4892] sctp_bind_addr_copy+0x7c/0x280 [ 2965.041942][ T4892] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2965.048047][ T4892] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2965.053364][ T4892] __sctp_connect+0x416/0xa80 [ 2965.058075][ T4892] sctp_setsockopt+0x2e29/0x8870 [ 2965.063091][ T4892] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2965.069308][ T4892] sock_common_setsockopt+0x5d/0x70 [ 2965.074572][ T4892] ? sock_common_recvmsg+0xe0/0xe0 [ 2965.079683][ T4892] __sys_setsockopt+0x209/0x2a0 05:52:33 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000014000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe58, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x1000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2965.084579][ T4892] __x64_sys_setsockopt+0x62/0x70 [ 2965.089607][ T4892] do_syscall_64+0x44/0xd0 [ 2965.094094][ T4892] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2965.099991][ T4892] RIP: 0033:0x7f4b20a29ae9 [ 2965.104404][ T4892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.124029][ T4892] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 23) [ 2965.132504][ T4892] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2965.140517][ T4892] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2965.148597][ T4892] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2965.156678][ T4892] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2965.164658][ T4892] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2965.172710][ T4892] [ 2965.177879][T24597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x65580000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe5c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2965.396230][ T5108] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2965.434652][ T5109] device Y4`Ҙ left promiscuous mode [ 2965.437343][ T5123] FAULT_INJECTION: forcing a failure. [ 2965.437343][ T5123] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.453853][ T5123] CPU: 0 PID: 5123 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2965.463717][ T5123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.473774][ T5123] Call Trace: [ 2965.477056][ T5123] [ 2965.479994][ T5123] dump_stack_lvl+0xd6/0x122 [ 2965.484610][ T5123] dump_stack+0x11/0x1b [ 2965.488794][ T5123] should_fail+0x23c/0x250 05:52:34 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000005800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6558}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2965.493227][ T5123] ? sctp_add_bind_addr+0x73/0x210 [ 2965.498388][ T5123] __should_failslab+0x81/0x90 [ 2965.503253][ T5123] should_failslab+0x5/0x20 [ 2965.507792][ T5123] kmem_cache_alloc_trace+0x52/0x350 [ 2965.513088][ T5123] ? sctp_add_bind_addr+0x73/0x210 [ 2965.518249][ T5123] sctp_add_bind_addr+0x73/0x210 [ 2965.523198][ T5123] sctp_copy_local_addr_list+0x1ab/0x230 [ 2965.528844][ T5123] sctp_copy_one_addr+0x7d/0x3f0 [ 2965.533825][ T5123] ? get_random_bytes+0x65/0x110 [ 2965.538806][ T5123] sctp_bind_addr_copy+0x7c/0x280 [ 2965.543849][ T5123] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2965.549970][ T5123] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2965.555265][ T5123] __sctp_connect+0x416/0xa80 [ 2965.559977][ T5123] sctp_setsockopt+0x2e29/0x8870 [ 2965.564908][ T5123] sock_common_setsockopt+0x5d/0x70 [ 2965.570157][ T5123] ? sock_common_recvmsg+0xe0/0xe0 [ 2965.575277][ T5123] __sys_setsockopt+0x209/0x2a0 [ 2965.580138][ T5123] __x64_sys_setsockopt+0x62/0x70 [ 2965.585170][ T5123] do_syscall_64+0x44/0xd0 [ 2965.589605][ T5123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2965.595506][ T5123] RIP: 0033:0x7f4b20a29ae9 [ 2965.599935][ T5123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.619552][ T5123] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2965.628403][ T5123] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2965.636401][ T5123] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:52:34 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000006400000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 24) [ 2965.644425][ T5123] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2965.652472][ T5123] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2965.660524][ T5123] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2965.668732][ T5123] [ 2965.674335][ T5109] device tunl0 left promiscuous mode [ 2965.700130][ T5109] device gre0 left promiscuous mode [ 2965.813827][ T5349] FAULT_INJECTION: forcing a failure. [ 2965.813827][ T5349] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.826912][ T5349] CPU: 0 PID: 5349 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2965.836733][ T5349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.846880][ T5349] Call Trace: [ 2965.850165][ T5349] [ 2965.853106][ T5349] dump_stack_lvl+0xd6/0x122 [ 2965.857708][ T5349] dump_stack+0x11/0x1b [ 2965.862044][ T5349] should_fail+0x23c/0x250 [ 2965.866516][ T5349] ? sctp_add_bind_addr+0x73/0x210 [ 2965.871697][ T5349] __should_failslab+0x81/0x90 [ 2965.876481][ T5349] should_failslab+0x5/0x20 [ 2965.881006][ T5349] kmem_cache_alloc_trace+0x52/0x350 [ 2965.886308][ T5349] sctp_add_bind_addr+0x73/0x210 [ 2965.891277][ T5349] sctp_copy_local_addr_list+0x1ab/0x230 [ 2965.896932][ T5349] sctp_copy_one_addr+0x7d/0x3f0 [ 2965.901989][ T5349] ? get_random_bytes+0x65/0x110 [ 2965.906938][ T5349] sctp_bind_addr_copy+0x7c/0x280 [ 2965.912013][ T5349] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2965.918091][ T5349] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2965.923452][ T5349] __sctp_connect+0x416/0xa80 [ 2965.928143][ T5349] sctp_setsockopt+0x2e29/0x8870 [ 2965.933089][ T5349] sock_common_setsockopt+0x5d/0x70 [ 2965.938329][ T5349] ? sock_common_recvmsg+0xe0/0xe0 [ 2965.943441][ T5349] __sys_setsockopt+0x209/0x2a0 [ 2965.948299][ T5349] __x64_sys_setsockopt+0x62/0x70 [ 2965.953328][ T5349] do_syscall_64+0x44/0xd0 [ 2965.957799][ T5349] entry_SYSCALL_64_after_hwframe+0x44/0xae 05:52:34 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000016600000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2965.963779][ T5349] RIP: 0033:0x7f4b20a29ae9 [ 2965.968195][ T5349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.987818][ T5349] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2965.996315][ T5349] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2966.004349][ T5349] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:52:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 25) 05:52:34 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000016a00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2966.012352][ T5349] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2966.020322][ T5349] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2966.028305][ T5349] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2966.036291][ T5349] [ 2966.041151][ T5109] device gretap0 left promiscuous mode [ 2966.084176][ T5109] device erspan0 left promiscuous mode [ 2966.114887][ T5109] device ip_vti0 left promiscuous mode [ 2966.134747][ T5109] device ip6_vti0 left promiscuous mode [ 2966.171587][ T5109] device sit0 left promiscuous mode [ 2966.219077][ T5546] FAULT_INJECTION: forcing a failure. [ 2966.219077][ T5546] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.231952][ T5546] CPU: 0 PID: 5546 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2966.241684][ T5546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.251821][ T5546] Call Trace: [ 2966.255104][ T5546] [ 2966.258043][ T5546] dump_stack_lvl+0xd6/0x122 [ 2966.262719][ T5546] dump_stack+0x11/0x1b [ 2966.266883][ T5546] should_fail+0x23c/0x250 [ 2966.271353][ T5546] ? sctp_add_bind_addr+0x73/0x210 [ 2966.276552][ T5546] __should_failslab+0x81/0x90 [ 2966.281342][ T5546] should_failslab+0x5/0x20 [ 2966.285872][ T5546] kmem_cache_alloc_trace+0x52/0x350 [ 2966.291184][ T5546] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2966.296458][ T5546] sctp_add_bind_addr+0x73/0x210 [ 2966.301405][ T5546] sctp_copy_local_addr_list+0x1ab/0x230 [ 2966.307104][ T5546] sctp_copy_one_addr+0x7d/0x3f0 [ 2966.312110][ T5546] ? get_random_bytes+0x65/0x110 [ 2966.317061][ T5546] sctp_bind_addr_copy+0x7c/0x280 [ 2966.322098][ T5546] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2966.328170][ T5546] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2966.333535][ T5546] __sctp_connect+0x416/0xa80 [ 2966.338227][ T5546] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2966.344392][ T5546] sctp_setsockopt+0x2e29/0x8870 [ 2966.349339][ T5546] sock_common_setsockopt+0x5d/0x70 [ 2966.354570][ T5546] ? sock_common_recvmsg+0xe0/0xe0 [ 2966.359713][ T5546] __sys_setsockopt+0x209/0x2a0 [ 2966.364575][ T5546] __x64_sys_setsockopt+0x62/0x70 [ 2966.369677][ T5546] do_syscall_64+0x44/0xd0 [ 2966.374107][ T5546] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2966.380094][ T5546] RIP: 0033:0x7f4b20a29ae9 [ 2966.384520][ T5546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2966.404229][ T5546] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 26) [ 2966.412663][ T5546] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2966.420638][ T5546] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2966.428696][ T5546] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2966.436767][ T5546] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2966.444745][ T5546] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2966.452818][ T5546] [ 2966.459870][ T5109] device ip6tnl0 left promiscuous mode [ 2966.501857][ T5109] device ip6gre0 left promiscuous mode [ 2966.633510][ T5863] FAULT_INJECTION: forcing a failure. [ 2966.633510][ T5863] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.646534][ T5863] CPU: 0 PID: 5863 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2966.656289][ T5863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.666359][ T5863] Call Trace: [ 2966.669676][ T5863] [ 2966.672615][ T5863] dump_stack_lvl+0xd6/0x122 [ 2966.677213][ T5863] dump_stack+0x11/0x1b [ 2966.681370][ T5863] should_fail+0x23c/0x250 [ 2966.685869][ T5863] ? sctp_add_bind_addr+0x73/0x210 [ 2966.691010][ T5863] __should_failslab+0x81/0x90 [ 2966.695781][ T5863] should_failslab+0x5/0x20 [ 2966.700427][ T5863] kmem_cache_alloc_trace+0x52/0x350 [ 2966.705789][ T5863] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2966.710994][ T5863] sctp_add_bind_addr+0x73/0x210 [ 2966.715945][ T5863] sctp_copy_local_addr_list+0x1ab/0x230 [ 2966.721588][ T5863] sctp_copy_one_addr+0x7d/0x3f0 [ 2966.726539][ T5863] sctp_bind_addr_copy+0x7c/0x280 [ 2966.731590][ T5863] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2966.737704][ T5863] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2966.742972][ T5863] __sctp_connect+0x416/0xa80 [ 2966.747690][ T5863] sctp_setsockopt+0x2e29/0x8870 [ 2966.752662][ T5863] sock_common_setsockopt+0x5d/0x70 [ 2966.757841][ T5863] ? sock_common_recvmsg+0xe0/0xe0 [ 2966.762987][ T5863] __sys_setsockopt+0x209/0x2a0 [ 2966.767821][ T5863] __x64_sys_setsockopt+0x62/0x70 [ 2966.772824][ T5863] do_syscall_64+0x44/0xd0 [ 2966.777313][ T5863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2966.783312][ T5863] RIP: 0033:0x7f4b20a29ae9 [ 2966.787703][ T5863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2966.807348][ T5863] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2966.815737][ T5863] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2966.823750][ T5863] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2966.831738][ T5863] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2966.839716][ T5863] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2966.847767][ T5863] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2966.855724][ T5863] [ 2966.860426][ T5109] device syz_tun left promiscuous mode [ 2966.896283][ T5109] device ip6gretap0 left promiscuous mode [ 2966.929575][ T5109] bridge0: port 2(bridge_slave_1) entered disabled state [ 2966.936718][ T5109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2966.943867][ T5109] device bridge0 left promiscuous mode 05:52:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x2000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:35 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000017a00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6e7645e0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe60, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 27) 05:52:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6800}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2966.977069][ T5222] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2967.048092][ T5898] FAULT_INJECTION: forcing a failure. [ 2967.048092][ T5898] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.061085][ T5898] CPU: 0 PID: 5898 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2967.070865][ T5898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.080920][ T5898] Call Trace: [ 2967.084202][ T5898] [ 2967.087127][ T5898] dump_stack_lvl+0xd6/0x122 [ 2967.091722][ T5898] dump_stack+0x11/0x1b 05:52:35 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000038200000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2967.095895][ T5898] should_fail+0x23c/0x250 [ 2967.100315][ T5898] ? sctp_add_bind_addr+0x73/0x210 [ 2967.105474][ T5898] __should_failslab+0x81/0x90 [ 2967.110247][ T5898] should_failslab+0x5/0x20 [ 2967.114923][ T5898] kmem_cache_alloc_trace+0x52/0x350 [ 2967.120325][ T5898] ? sctp_v4_cmp_addr+0x6f/0xb0 [ 2967.125176][ T5898] sctp_add_bind_addr+0x73/0x210 [ 2967.130190][ T5898] sctp_copy_local_addr_list+0x1ab/0x230 [ 2967.135875][ T5898] sctp_copy_one_addr+0x7d/0x3f0 [ 2967.140819][ T5898] ? get_random_bytes+0x65/0x110 [ 2967.145762][ T5898] sctp_bind_addr_copy+0x7c/0x280 [ 2967.150797][ T5898] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2967.156109][ T5976] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2967.156875][ T5898] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2967.156903][ T5898] __sctp_connect+0x416/0xa80 [ 2967.176180][ T5898] sctp_setsockopt+0x2e29/0x8870 [ 2967.181129][ T5898] sock_common_setsockopt+0x5d/0x70 [ 2967.185040][ T5979] device Y4`Ҙ entered promiscuous mode [ 2967.186340][ T5898] ? sock_common_recvmsg+0xe0/0xe0 [ 2967.192729][ T5979] device tunl0 entered promiscuous mode [ 2967.197212][ T5898] __sys_setsockopt+0x209/0x2a0 [ 2967.197243][ T5898] __x64_sys_setsockopt+0x62/0x70 [ 2967.203438][ T5979] device gre0 entered promiscuous mode [ 2967.207644][ T5898] do_syscall_64+0x44/0xd0 [ 2967.207666][ T5898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2967.213204][ T5979] device gretap0 entered promiscuous mode [ 2967.218120][ T5898] RIP: 0033:0x7f4b20a29ae9 [ 2967.218140][ T5898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2967.223204][ T5979] device erspan0 entered promiscuous mode [ 2967.228520][ T5898] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 [ 2967.234676][ T5979] device ip_vti0 entered promiscuous mode [ 2967.238661][ T5898] ORIG_RAX: 0000000000000036 [ 2967.258689][ T5979] device ip6_vti0 entered promiscuous mode [ 2967.263935][ T5898] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2967.270389][ T5979] device sit0 entered promiscuous mode [ 2967.275660][ T5898] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2967.280805][ T5979] device ip6tnl0 entered promiscuous mode [ 2967.286364][ T5898] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2967.286379][ T5898] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2967.294919][ T5979] device ip6gre0 entered promiscuous mode [ 2967.299759][ T5898] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2967.299779][ T5898] 05:52:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 28) 05:52:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x3000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6c00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe64, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x81000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2967.308196][ T5979] device syz_tun entered promiscuous mode [ 2967.352783][ T5979] device ip6gretap0 entered promiscuous mode [ 2967.359401][ T5979] device bridge0 entered promiscuous mode [ 2967.367516][ T5985] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:36 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000008800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2967.606056][ T6296] FAULT_INJECTION: forcing a failure. [ 2967.606056][ T6296] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.618797][ T6296] CPU: 1 PID: 6296 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2967.628684][ T6296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.638730][ T6296] Call Trace: [ 2967.642011][ T6296] [ 2967.644932][ T6296] dump_stack_lvl+0xd6/0x122 [ 2967.649556][ T6296] dump_stack+0x11/0x1b [ 2967.653711][ T6296] should_fail+0x23c/0x250 [ 2967.658114][ T6296] ? sctp_add_bind_addr+0x73/0x210 [ 2967.663286][ T6296] __should_failslab+0x81/0x90 [ 2967.668161][ T6296] should_failslab+0x5/0x20 [ 2967.672646][ T6296] kmem_cache_alloc_trace+0x52/0x350 [ 2967.677909][ T6296] ? sctp_add_bind_addr+0x73/0x210 [ 2967.683005][ T6296] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2967.688225][ T6296] sctp_add_bind_addr+0x73/0x210 [ 2967.693231][ T6296] sctp_copy_local_addr_list+0x1ab/0x230 [ 2967.698947][ T6296] sctp_copy_one_addr+0x7d/0x3f0 [ 2967.703868][ T6296] ? get_random_bytes+0x65/0x110 [ 2967.708805][ T6296] sctp_bind_addr_copy+0x7c/0x280 [ 2967.713809][ T6296] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2967.720056][ T6296] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2967.725345][ T6296] __sctp_connect+0x416/0xa80 [ 2967.730105][ T6296] sctp_setsockopt+0x2e29/0x8870 [ 2967.735040][ T6296] sock_common_setsockopt+0x5d/0x70 [ 2967.740264][ T6296] ? sock_common_recvmsg+0xe0/0xe0 [ 2967.745360][ T6296] __sys_setsockopt+0x209/0x2a0 [ 2967.750219][ T6296] __x64_sys_setsockopt+0x62/0x70 [ 2967.755267][ T6296] do_syscall_64+0x44/0xd0 [ 2967.759685][ T6296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2967.765645][ T6296] RIP: 0033:0x7f4b20a29ae9 [ 2967.770040][ T6296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2967.789825][ T6296] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2967.798218][ T6296] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 29) [ 2967.806219][ T6296] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2967.814318][ T6296] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2967.822303][ T6296] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2967.830257][ T6296] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2967.838312][ T6296] 05:52:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe68, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2967.860077][ T6299] device Y4`Ҙ left promiscuous mode [ 2967.866400][ T6299] device tunl0 left promiscuous mode [ 2967.872219][ T6299] device gre0 left promiscuous mode [ 2967.877912][ T6299] device gretap0 left promiscuous mode [ 2967.883843][ T6299] device erspan0 left promiscuous mode [ 2967.889867][ T6299] device ip_vti0 left promiscuous mode [ 2967.895836][ T6299] device ip6_vti0 left promiscuous mode [ 2967.901880][ T6299] device sit0 left promiscuous mode [ 2967.907816][ T6299] device ip6tnl0 left promiscuous mode [ 2967.913672][ T6299] device ip6gre0 left promiscuous mode [ 2967.919684][ T6299] device syz_tun left promiscuous mode [ 2967.925623][ T6299] device ip6gretap0 left promiscuous mode [ 2967.931791][ T6299] device bridge0 left promiscuous mode 05:52:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7400}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88470000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x4000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:36 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000038c00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2968.087479][ T6619] FAULT_INJECTION: forcing a failure. [ 2968.087479][ T6619] name failslab, interval 1, probability 0, space 0, times 0 [ 2968.100135][ T6619] CPU: 0 PID: 6619 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2968.109871][ T6619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2968.119923][ T6619] Call Trace: [ 2968.123203][ T6619] [ 2968.126128][ T6619] dump_stack_lvl+0xd6/0x122 [ 2968.130816][ T6619] dump_stack+0x11/0x1b 05:52:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe6c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.135001][ T6619] should_fail+0x23c/0x250 [ 2968.139484][ T6619] ? sctp_add_bind_addr+0x73/0x210 [ 2968.144603][ T6619] __should_failslab+0x81/0x90 [ 2968.149404][ T6619] should_failslab+0x5/0x20 [ 2968.154004][ T6619] kmem_cache_alloc_trace+0x52/0x350 [ 2968.159326][ T6619] ? sctp_bind_addr_state+0x87/0x100 [ 2968.164627][ T6619] ? sctp_bind_addr_state+0x59/0x100 [ 2968.170040][ T6619] sctp_add_bind_addr+0x73/0x210 [ 2968.175032][ T6619] sctp_copy_local_addr_list+0x1ab/0x230 [ 2968.180694][ T6619] sctp_copy_one_addr+0x7d/0x3f0 [ 2968.185624][ T6619] ? get_random_bytes+0x65/0x110 [ 2968.190690][ T6619] sctp_bind_addr_copy+0x7c/0x280 [ 2968.195735][ T6619] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2968.201823][ T6619] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2968.207124][ T6619] __sctp_connect+0x416/0xa80 [ 2968.211840][ T6619] sctp_setsockopt+0x2e29/0x8870 [ 2968.216857][ T6619] sock_common_setsockopt+0x5d/0x70 [ 2968.222064][ T6619] ? sock_common_recvmsg+0xe0/0xe0 [ 2968.227191][ T6619] __sys_setsockopt+0x209/0x2a0 [ 2968.232192][ T6619] __x64_sys_setsockopt+0x62/0x70 05:52:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7a00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.237230][ T6619] do_syscall_64+0x44/0xd0 [ 2968.241656][ T6619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2968.247561][ T6619] RIP: 0033:0x7f4b20a29ae9 [ 2968.252039][ T6619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2968.271666][ T6619] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2968.280088][ T6619] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88480000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x5000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 30) 05:52:36 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000019000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe70, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.288067][ T6619] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2968.296042][ T6619] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2968.304019][ T6619] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2968.312099][ T6619] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2968.320127][ T6619] 05:52:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88a8ffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe74, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x6000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.514169][ T7168] FAULT_INJECTION: forcing a failure. [ 2968.514169][ T7168] name failslab, interval 1, probability 0, space 0, times 0 [ 2968.527013][ T7168] CPU: 0 PID: 7168 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2968.536718][ T7168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2968.546775][ T7168] Call Trace: [ 2968.550118][ T7168] [ 2968.553048][ T7168] dump_stack_lvl+0xd6/0x122 [ 2968.557649][ T7168] dump_stack+0x11/0x1b 05:52:37 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000009800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2968.561991][ T7168] should_fail+0x23c/0x250 [ 2968.566415][ T7168] ? sctp_add_bind_addr+0x73/0x210 [ 2968.571621][ T7168] __should_failslab+0x81/0x90 [ 2968.576433][ T7168] should_failslab+0x5/0x20 [ 2968.580945][ T7168] kmem_cache_alloc_trace+0x52/0x350 [ 2968.586247][ T7168] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2968.591476][ T7168] sctp_add_bind_addr+0x73/0x210 [ 2968.596416][ T7168] sctp_copy_local_addr_list+0x1ab/0x230 [ 2968.602066][ T7168] sctp_copy_one_addr+0x7d/0x3f0 [ 2968.607034][ T7168] sctp_bind_addr_copy+0x7c/0x280 [ 2968.612068][ T7168] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2968.618145][ T7168] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2968.623485][ T7168] __sctp_connect+0x416/0xa80 [ 2968.628350][ T7168] ? security_sctp_bind_connect+0x6f/0xb0 [ 2968.634138][ T7168] ? security_sctp_bind_connect+0x8d/0xb0 [ 2968.639900][ T7168] sctp_setsockopt+0x2e29/0x8870 [ 2968.644843][ T7168] ? security_socket_setsockopt+0x7f/0x90 [ 2968.650639][ T7168] sock_common_setsockopt+0x5d/0x70 [ 2968.655849][ T7168] ? sock_common_recvmsg+0xe0/0xe0 [ 2968.660983][ T7168] __sys_setsockopt+0x209/0x2a0 [ 2968.665841][ T7168] __x64_sys_setsockopt+0x62/0x70 [ 2968.670486][ T7280] device Y4`Ҙ entered promiscuous mode [ 2968.670951][ T7168] do_syscall_64+0x44/0xd0 [ 2968.678937][ T7280] device tunl0 entered promiscuous mode [ 2968.681158][ T7168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2968.688403][ T7280] device gre0 entered promiscuous mode [ 2968.692571][ T7168] RIP: 0033:0x7f4b20a29ae9 [ 2968.702420][ T7168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2968.712566][ T7280] device gretap0 entered promiscuous mode [ 2968.722083][ T7168] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2968.722104][ T7168] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2968.729565][ T7280] device erspan0 entered promiscuous mode [ 2968.736216][ T7168] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2968.746465][ T7280] device ip_vti0 entered promiscuous mode [ 2968.749860][ T7168] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2968.759859][ T7280] device ip6_vti0 entered promiscuous mode [ 2968.763523][ T7168] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2968.773585][ T7280] device sit0 entered promiscuous mode [ 2968.777255][ T7168] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2968.777274][ T7168] 05:52:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8847}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.821102][ T7280] device ip6tnl0 entered promiscuous mode [ 2968.829535][ T7280] device ip6gre0 entered promiscuous mode [ 2968.856117][ T7280] device syz_tun entered promiscuous mode [ 2968.864360][ T7280] device ip6gretap0 entered promiscuous mode 05:52:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 31) 05:52:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x7000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.872953][ T7280] bridge0: port 2(bridge_slave_1) entered blocking state [ 2968.880025][ T7280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2968.887299][ T7280] bridge0: port 1(bridge_slave_0) entered blocking state [ 2968.894395][ T7280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2968.901724][ T7280] device bridge0 entered promiscuous mode [ 2968.909092][ T7281] __nla_validate_parse: 5 callbacks suppressed 05:52:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe78, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x9effffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2968.909106][ T7281] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2968.924695][T26941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2968.933245][ T7421] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:37 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000019800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8848}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2969.131845][ T7667] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2969.145066][ T7669] FAULT_INJECTION: forcing a failure. [ 2969.145066][ T7669] name failslab, interval 1, probability 0, space 0, times 0 [ 2969.157927][ T7669] CPU: 1 PID: 7669 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2969.167656][ T7669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2969.177833][ T7669] Call Trace: 05:52:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe7c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2969.181111][ T7669] [ 2969.184098][ T7669] dump_stack_lvl+0xd6/0x122 [ 2969.188693][ T7669] dump_stack+0x11/0x1b [ 2969.192870][ T7669] should_fail+0x23c/0x250 [ 2969.197340][ T7669] ? sctp_add_bind_addr+0x73/0x210 [ 2969.202585][ T7669] __should_failslab+0x81/0x90 [ 2969.207455][ T7669] should_failslab+0x5/0x20 [ 2969.212018][ T7669] kmem_cache_alloc_trace+0x52/0x350 [ 2969.217311][ T7669] ? sctp_v4_cmp_addr+0x7c/0xb0 [ 2969.222163][ T7669] sctp_add_bind_addr+0x73/0x210 05:52:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x8000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2969.227107][ T7669] sctp_copy_local_addr_list+0x1ab/0x230 [ 2969.232740][ T7669] sctp_copy_one_addr+0x7d/0x3f0 [ 2969.237679][ T7669] ? get_random_bytes+0x65/0x110 [ 2969.242669][ T7669] sctp_bind_addr_copy+0x7c/0x280 [ 2969.247752][ T7669] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2969.253812][ T7669] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2969.259128][ T7669] __sctp_connect+0x416/0xa80 [ 2969.263810][ T7669] sctp_setsockopt+0x2e29/0x8870 [ 2969.268952][ T7669] sock_common_setsockopt+0x5d/0x70 [ 2969.274210][ T7669] ? sock_common_recvmsg+0xe0/0xe0 [ 2969.279312][ T7669] __sys_setsockopt+0x209/0x2a0 [ 2969.284183][ T7669] __x64_sys_setsockopt+0x62/0x70 [ 2969.289558][ T7669] do_syscall_64+0x44/0xd0 [ 2969.293961][ T7669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2969.299846][ T7669] RIP: 0033:0x7f4b20a29ae9 [ 2969.304250][ T7669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2969.324082][ T7669] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 32) [ 2969.332618][ T7669] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2969.340663][ T7669] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2969.348796][ T7669] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2969.356756][ T7669] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2969.364724][ T7669] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2969.372679][ T7669] 05:52:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc3050000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:38 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000039c00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2969.598652][ T7932] FAULT_INJECTION: forcing a failure. [ 2969.598652][ T7932] name failslab, interval 1, probability 0, space 0, times 0 [ 2969.607170][ T7935] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2969.612766][ T7932] CPU: 0 PID: 7932 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2969.630465][ T7932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2969.640523][ T7932] Call Trace: [ 2969.643832][ T7932] 05:52:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe80, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9f03}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2969.646762][ T7932] dump_stack_lvl+0xd6/0x122 [ 2969.651358][ T7932] dump_stack+0x11/0x1b [ 2969.655512][ T7932] should_fail+0x23c/0x250 [ 2969.660056][ T7932] ? sctp_add_bind_addr+0x73/0x210 [ 2969.665236][ T7932] __should_failslab+0x81/0x90 [ 2969.670049][ T7932] should_failslab+0x5/0x20 [ 2969.674632][ T7932] kmem_cache_alloc_trace+0x52/0x350 [ 2969.679930][ T7932] ? sctp_bind_addr_state+0x66/0x100 [ 2969.685232][ T7932] ? sctp_bind_addr_state+0x59/0x100 [ 2969.690561][ T7932] sctp_add_bind_addr+0x73/0x210 05:52:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x9000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2969.695547][ T7932] sctp_copy_local_addr_list+0x1ab/0x230 [ 2969.701210][ T7932] sctp_copy_one_addr+0x7d/0x3f0 [ 2969.706221][ T7932] sctp_bind_addr_copy+0x7c/0x280 [ 2969.711249][ T7932] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2969.717411][ T7932] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2969.722825][ T7932] __sctp_connect+0x416/0xa80 [ 2969.727509][ T7932] sctp_setsockopt+0x2e29/0x8870 [ 2969.732557][ T7932] sock_common_setsockopt+0x5d/0x70 [ 2969.737770][ T7932] ? sock_common_recvmsg+0xe0/0xe0 [ 2969.742891][ T7932] __sys_setsockopt+0x209/0x2a0 [ 2969.747826][ T7932] __x64_sys_setsockopt+0x62/0x70 [ 2969.752860][ T7932] do_syscall_64+0x44/0xd0 [ 2969.757277][ T7932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2969.763239][ T7932] RIP: 0033:0x7f4b20a29ae9 [ 2969.767647][ T7932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2969.787342][ T7932] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:38 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 33) [ 2969.795784][ T7932] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2969.803787][ T7932] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2969.811771][ T7932] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2969.819741][ T7932] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2969.827717][ T7932] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2969.835710][ T7932] [ 2969.839545][ T7977] device Y4`Ҙ left promiscuous mode [ 2969.875590][ T7977] device tunl0 left promiscuous mode [ 2969.895469][ T7977] device gre0 left promiscuous mode [ 2970.023817][ T8156] FAULT_INJECTION: forcing a failure. [ 2970.023817][ T8156] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.036776][ T8156] CPU: 0 PID: 8156 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2970.046498][ T8156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.056990][ T8156] Call Trace: [ 2970.060269][ T8156] [ 2970.063199][ T8156] dump_stack_lvl+0xd6/0x122 [ 2970.067837][ T8156] dump_stack+0x11/0x1b [ 2970.072062][ T8156] should_fail+0x23c/0x250 [ 2970.076484][ T8156] ? sctp_add_bind_addr+0x73/0x210 [ 2970.081626][ T8156] __should_failslab+0x81/0x90 [ 2970.086396][ T8156] should_failslab+0x5/0x20 [ 2970.090905][ T8156] kmem_cache_alloc_trace+0x52/0x350 [ 2970.096229][ T8156] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2970.101459][ T8156] sctp_add_bind_addr+0x73/0x210 [ 2970.106402][ T8156] sctp_copy_local_addr_list+0x1ab/0x230 [ 2970.112093][ T8156] sctp_copy_one_addr+0x7d/0x3f0 [ 2970.117086][ T8156] ? get_random_bytes+0x65/0x110 05:52:38 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003c000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2970.122034][ T8156] sctp_bind_addr_copy+0x7c/0x280 [ 2970.127104][ T8156] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2970.133258][ T8156] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2970.138581][ T8156] __sctp_connect+0x416/0xa80 [ 2970.143332][ T8156] sctp_setsockopt+0x2e29/0x8870 [ 2970.148472][ T8156] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2970.154638][ T8156] sock_common_setsockopt+0x5d/0x70 [ 2970.159916][ T8156] ? sock_common_recvmsg+0xe0/0xe0 [ 2970.165039][ T8156] __sys_setsockopt+0x209/0x2a0 [ 2970.170050][ T8156] __x64_sys_setsockopt+0x62/0x70 [ 2970.175070][ T8156] do_syscall_64+0x44/0xd0 [ 2970.179843][ T8156] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2970.185919][ T8156] RIP: 0033:0x7f4b20a29ae9 [ 2970.190338][ T8156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2970.209954][ T8156] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:38 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000001ca00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 34) [ 2970.218494][ T8156] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2970.226472][ T8156] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2970.234448][ T8156] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2970.242441][ T8156] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2970.250419][ T8156] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2970.258392][ T8156] [ 2970.263769][ T7977] device gretap0 left promiscuous mode [ 2970.301701][ T7977] device erspan0 left promiscuous mode [ 2970.334094][ T7977] device ip_vti0 left promiscuous mode [ 2970.353471][ T7977] device ip6_vti0 left promiscuous mode [ 2970.392797][ T7977] device sit0 left promiscuous mode [ 2970.426016][ T8477] FAULT_INJECTION: forcing a failure. [ 2970.426016][ T8477] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.438899][ T8477] CPU: 0 PID: 8477 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2970.448624][ T8477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.458742][ T8477] Call Trace: [ 2970.462027][ T8477] [ 2970.464963][ T8477] dump_stack_lvl+0xd6/0x122 [ 2970.469560][ T8477] dump_stack+0x11/0x1b [ 2970.473801][ T8477] should_fail+0x23c/0x250 [ 2970.478288][ T8477] ? sctp_add_bind_addr+0x73/0x210 [ 2970.483511][ T8477] __should_failslab+0x81/0x90 [ 2970.488356][ T8477] should_failslab+0x5/0x20 [ 2970.492865][ T8477] kmem_cache_alloc_trace+0x52/0x350 [ 2970.498156][ T8477] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2970.503395][ T8477] sctp_add_bind_addr+0x73/0x210 [ 2970.508392][ T8477] sctp_copy_local_addr_list+0x1ab/0x230 [ 2970.514029][ T8477] sctp_copy_one_addr+0x7d/0x3f0 [ 2970.519000][ T8477] ? get_random_bytes+0x65/0x110 [ 2970.524047][ T8477] sctp_bind_addr_copy+0x7c/0x280 [ 2970.529073][ T8477] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2970.535212][ T8477] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2970.540579][ T8477] __sctp_connect+0x416/0xa80 [ 2970.545264][ T8477] sctp_setsockopt+0x2e29/0x8870 [ 2970.550206][ T8477] sock_common_setsockopt+0x5d/0x70 [ 2970.555414][ T8477] ? sock_common_recvmsg+0xe0/0xe0 [ 2970.560534][ T8477] __sys_setsockopt+0x209/0x2a0 [ 2970.565388][ T8477] __x64_sys_setsockopt+0x62/0x70 [ 2970.570440][ T8477] do_syscall_64+0x44/0xd0 [ 2970.574858][ T8477] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2970.580753][ T8477] RIP: 0033:0x7f4b20a29ae9 [ 2970.585169][ T8477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2970.604914][ T8477] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2970.613491][ T8477] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:39 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003ca00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 35) [ 2970.621475][ T8477] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2970.629533][ T8477] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2970.637509][ T8477] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2970.645506][ T8477] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2970.653560][ T8477] [ 2970.659245][ T7977] device ip6tnl0 left promiscuous mode [ 2970.702391][ T7977] device ip6gre0 left promiscuous mode [ 2970.784991][ T8788] FAULT_INJECTION: forcing a failure. [ 2970.784991][ T8788] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.797794][ T8788] CPU: 0 PID: 8788 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2970.807535][ T8788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.817590][ T8788] Call Trace: [ 2970.820904][ T8788] [ 2970.823834][ T8788] dump_stack_lvl+0xd6/0x122 [ 2970.828598][ T8788] dump_stack+0x11/0x1b [ 2970.832753][ T8788] should_fail+0x23c/0x250 [ 2970.837187][ T8788] ? sctp_add_bind_addr+0x73/0x210 [ 2970.842307][ T8788] __should_failslab+0x81/0x90 [ 2970.847135][ T8788] should_failslab+0x5/0x20 [ 2970.851642][ T8788] kmem_cache_alloc_trace+0x52/0x350 [ 2970.856935][ T8788] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2970.862299][ T8788] sctp_add_bind_addr+0x73/0x210 [ 2970.867236][ T8788] sctp_copy_local_addr_list+0x1ab/0x230 [ 2970.872896][ T8788] sctp_copy_one_addr+0x7d/0x3f0 [ 2970.877837][ T8788] ? get_random_bytes+0x65/0x110 [ 2970.882817][ T8788] sctp_bind_addr_copy+0x7c/0x280 [ 2970.887845][ T8788] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2970.893989][ T8788] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2970.899357][ T8788] __sctp_connect+0x416/0xa80 [ 2970.904092][ T8788] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2970.910264][ T8788] sctp_setsockopt+0x2e29/0x8870 [ 2970.915209][ T8788] sock_common_setsockopt+0x5d/0x70 [ 2970.920452][ T8788] ? sock_common_recvmsg+0xe0/0xe0 [ 2970.925564][ T8788] __sys_setsockopt+0x209/0x2a0 [ 2970.930426][ T8788] __x64_sys_setsockopt+0x62/0x70 [ 2970.935456][ T8788] do_syscall_64+0x44/0xd0 [ 2970.939896][ T8788] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2970.945861][ T8788] RIP: 0033:0x7f4b20a29ae9 [ 2970.950296][ T8788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2970.969991][ T8788] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2970.978406][ T8788] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2970.986460][ T8788] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2970.994416][ T8788] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2971.002373][ T8788] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2971.010374][ T8788] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2971.018345][ T8788] [ 2971.022964][ T7977] device syz_tun left promiscuous mode [ 2971.062941][ T7977] device ip6gretap0 left promiscuous mode [ 2971.096308][ T7977] bridge0: port 2(bridge_slave_1) entered disabled state [ 2971.103391][ T7977] bridge0: port 1(bridge_slave_0) entered disabled state [ 2971.110606][ T7977] device bridge0 left promiscuous mode 05:52:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc3ffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:39 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003cc00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe84, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc305}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xa000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 36) [ 2971.138344][ T8086] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:39 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000d400000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2971.216278][ T8868] FAULT_INJECTION: forcing a failure. [ 2971.216278][ T8868] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.229393][ T8868] CPU: 0 PID: 8868 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2971.239120][ T8868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.249192][ T8868] Call Trace: [ 2971.252477][ T8868] [ 2971.255443][ T8868] dump_stack_lvl+0xd6/0x122 [ 2971.260048][ T8868] dump_stack+0x11/0x1b [ 2971.264241][ T8868] should_fail+0x23c/0x250 [ 2971.268670][ T8868] ? sctp_add_bind_addr+0x73/0x210 [ 2971.273788][ T8868] __should_failslab+0x81/0x90 [ 2971.278565][ T8868] should_failslab+0x5/0x20 [ 2971.283073][ T8868] kmem_cache_alloc_trace+0x52/0x350 [ 2971.288395][ T8868] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2971.293598][ T8868] sctp_add_bind_addr+0x73/0x210 [ 2971.298631][ T8868] sctp_copy_local_addr_list+0x1ab/0x230 [ 2971.301455][ T8900] device Y4`Ҙ entered promiscuous mode [ 2971.304279][ T8868] sctp_copy_one_addr+0x7d/0x3f0 [ 2971.311875][ T8900] device tunl0 entered promiscuous mode [ 2971.315001][ T8868] ? get_random_bytes+0x65/0x110 [ 2971.322572][ T8900] device gre0 entered promiscuous mode [ 2971.325457][ T8868] sctp_bind_addr_copy+0x7c/0x280 [ 2971.335992][ T8868] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2971.342059][ T8868] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2971.345012][ T8900] device gretap0 entered promiscuous mode [ 2971.347340][ T8868] __sctp_connect+0x416/0xa80 [ 2971.347363][ T8868] sctp_setsockopt+0x2e29/0x8870 [ 2971.355355][ T8900] device erspan0 entered promiscuous mode [ 2971.357743][ T8868] sock_common_setsockopt+0x5d/0x70 [ 2971.365147][ T8900] device ip_vti0 entered promiscuous mode [ 2971.368360][ T8868] ? sock_common_recvmsg+0xe0/0xe0 [ 2971.368385][ T8868] __sys_setsockopt+0x209/0x2a0 [ 2971.375652][ T8900] device ip6_vti0 entered promiscuous mode [ 2971.379295][ T8868] __x64_sys_setsockopt+0x62/0x70 [ 2971.386714][ T8900] device sit0 entered promiscuous mode [ 2971.389224][ T8868] do_syscall_64+0x44/0xd0 [ 2971.389246][ T8868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2971.414776][ T8900] device ip6tnl0 entered promiscuous mode [ 2971.415871][ T8868] RIP: 0033:0x7f4b20a29ae9 [ 2971.424102][ T8900] device ip6gre0 entered promiscuous mode [ 2971.425977][ T8868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.451239][ T8900] device syz_tun entered promiscuous mode [ 2971.451367][ T8868] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 37) [ 2971.451390][ T8868] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2971.451404][ T8868] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2971.451418][ T8868] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2971.459556][ T8900] device ip6gretap0 entered promiscuous mode [ 2971.465512][ T8868] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2971.465529][ T8868] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2971.465547][ T8868] [ 2971.516934][ T8900] bridge0: port 2(bridge_slave_1) entered blocking state [ 2971.524142][ T8900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2971.531408][ T8900] bridge0: port 1(bridge_slave_0) entered blocking state [ 2971.538567][ T8900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2971.545802][ T8900] device bridge0 entered promiscuous mode 05:52:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc94d0000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe88, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x34000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2971.602282][ T9003] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2971.762247][ T9145] FAULT_INJECTION: forcing a failure. [ 2971.762247][ T9145] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.775123][ T9145] CPU: 0 PID: 9145 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2971.784897][ T9145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.794994][ T9145] Call Trace: [ 2971.798270][ T9145] [ 2971.801263][ T9145] dump_stack_lvl+0xd6/0x122 [ 2971.805904][ T9145] dump_stack+0x11/0x1b 05:52:40 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003d400000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2971.810068][ T9145] should_fail+0x23c/0x250 [ 2971.814496][ T9145] ? sctp_add_bind_addr+0x73/0x210 [ 2971.819788][ T9145] __should_failslab+0x81/0x90 [ 2971.824639][ T9145] should_failslab+0x5/0x20 [ 2971.829149][ T9145] kmem_cache_alloc_trace+0x52/0x350 [ 2971.834504][ T9145] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2971.839792][ T9145] sctp_add_bind_addr+0x73/0x210 [ 2971.844719][ T9145] sctp_copy_local_addr_list+0x1ab/0x230 [ 2971.850360][ T9145] sctp_copy_one_addr+0x7d/0x3f0 [ 2971.855303][ T9145] ? get_random_bytes+0x65/0x110 [ 2971.860247][ T9145] sctp_bind_addr_copy+0x7c/0x280 [ 2971.865267][ T9145] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2971.871348][ T9145] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2971.876640][ T9145] __sctp_connect+0x416/0xa80 [ 2971.881371][ T9145] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2971.887533][ T9145] sctp_setsockopt+0x2e29/0x8870 [ 2971.892533][ T9145] sock_common_setsockopt+0x5d/0x70 [ 2971.897734][ T9145] ? sock_common_recvmsg+0xe0/0xe0 [ 2971.902853][ T9145] __sys_setsockopt+0x209/0x2a0 [ 2971.907815][ T9145] __x64_sys_setsockopt+0x62/0x70 05:52:40 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003da00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2971.912916][ T9145] do_syscall_64+0x44/0xd0 [ 2971.917332][ T9145] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2971.923250][ T9145] RIP: 0033:0x7f4b20a29ae9 [ 2971.927714][ T9145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.947369][ T9145] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:40 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000e800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 38) [ 2971.955777][ T9145] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2971.963754][ T9145] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2971.971728][ T9145] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2971.979712][ T9145] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2971.987684][ T9145] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2971.995659][ T9145] [ 2971.999389][ T9186] device Y4`Ҙ left promiscuous mode [ 2972.036952][ T9186] device tunl0 left promiscuous mode [ 2972.055689][ T9186] device gre0 left promiscuous mode [ 2972.160565][ T9458] FAULT_INJECTION: forcing a failure. [ 2972.160565][ T9458] name failslab, interval 1, probability 0, space 0, times 0 [ 2972.173514][ T9458] CPU: 0 PID: 9458 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2972.183290][ T9458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.193346][ T9458] Call Trace: [ 2972.196623][ T9458] [ 2972.199546][ T9458] dump_stack_lvl+0xd6/0x122 [ 2972.204165][ T9458] dump_stack+0x11/0x1b [ 2972.208340][ T9458] should_fail+0x23c/0x250 [ 2972.212766][ T9458] ? sctp_add_bind_addr+0x73/0x210 [ 2972.218068][ T9458] __should_failslab+0x81/0x90 [ 2972.222912][ T9458] should_failslab+0x5/0x20 [ 2972.227421][ T9458] kmem_cache_alloc_trace+0x52/0x350 [ 2972.232797][ T9458] ? sctp_bind_addr_state+0x87/0x100 [ 2972.238084][ T9458] ? sctp_bind_addr_state+0x59/0x100 [ 2972.243470][ T9458] sctp_add_bind_addr+0x73/0x210 [ 2972.248429][ T9458] sctp_copy_local_addr_list+0x1ab/0x230 [ 2972.254110][ T9458] sctp_copy_one_addr+0x7d/0x3f0 [ 2972.259054][ T9458] ? get_random_bytes+0x65/0x110 [ 2972.264004][ T9458] sctp_bind_addr_copy+0x7c/0x280 [ 2972.269035][ T9458] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2972.275158][ T9458] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2972.280563][ T9458] __sctp_connect+0x416/0xa80 [ 2972.285249][ T9458] sctp_setsockopt+0x2e29/0x8870 [ 2972.290200][ T9458] sock_common_setsockopt+0x5d/0x70 [ 2972.295406][ T9458] ? sock_common_recvmsg+0xe0/0xe0 [ 2972.300572][ T9458] __sys_setsockopt+0x209/0x2a0 [ 2972.305429][ T9458] __x64_sys_setsockopt+0x62/0x70 05:52:40 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000001ed6e800000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2972.310459][ T9458] do_syscall_64+0x44/0xd0 [ 2972.314905][ T9458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2972.320847][ T9458] RIP: 0033:0x7f4b20a29ae9 [ 2972.325313][ T9458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2972.345235][ T9458] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2972.353681][ T9458] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 39) 05:52:40 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000002f400000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2972.361685][ T9458] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2972.369649][ T9458] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2972.377625][ T9458] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2972.385664][ T9458] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2972.393693][ T9458] [ 2972.398483][ T9186] device gretap0 left promiscuous mode [ 2972.442115][ T9186] device erspan0 left promiscuous mode [ 2972.472300][ T9186] device ip_vti0 left promiscuous mode [ 2972.491250][ T9186] device ip6_vti0 left promiscuous mode [ 2972.528846][ T9186] device sit0 left promiscuous mode [ 2972.579484][ T9662] FAULT_INJECTION: forcing a failure. [ 2972.579484][ T9662] name failslab, interval 1, probability 0, space 0, times 0 [ 2972.592323][ T9662] CPU: 0 PID: 9662 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2972.602115][ T9662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.612239][ T9662] Call Trace: [ 2972.615520][ T9662] [ 2972.618480][ T9662] dump_stack_lvl+0xd6/0x122 [ 2972.623177][ T9662] dump_stack+0x11/0x1b [ 2972.627346][ T9662] should_fail+0x23c/0x250 [ 2972.631806][ T9662] ? sctp_add_bind_addr+0x73/0x210 [ 2972.636920][ T9662] __should_failslab+0x81/0x90 [ 2972.641718][ T9662] should_failslab+0x5/0x20 [ 2972.646311][ T9662] kmem_cache_alloc_trace+0x52/0x350 [ 2972.651602][ T9662] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2972.656823][ T9662] sctp_add_bind_addr+0x73/0x210 [ 2972.661821][ T9662] sctp_copy_local_addr_list+0x1ab/0x230 [ 2972.667602][ T9662] sctp_copy_one_addr+0x7d/0x3f0 [ 2972.672625][ T9662] ? get_random_bytes+0x65/0x110 [ 2972.677649][ T9662] sctp_bind_addr_copy+0x7c/0x280 [ 2972.682681][ T9662] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2972.688783][ T9662] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2972.694129][ T9662] __sctp_connect+0x416/0xa80 [ 2972.698818][ T9662] sctp_setsockopt+0x2e29/0x8870 [ 2972.703767][ T9662] ? selinux_netlbl_socket_setsockopt+0x96/0x2c0 [ 2972.710137][ T9662] sock_common_setsockopt+0x5d/0x70 [ 2972.715376][ T9662] ? sock_common_recvmsg+0xe0/0xe0 [ 2972.720501][ T9662] __sys_setsockopt+0x209/0x2a0 [ 2972.725360][ T9662] __x64_sys_setsockopt+0x62/0x70 [ 2972.730504][ T9662] do_syscall_64+0x44/0xd0 [ 2972.734934][ T9662] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2972.740837][ T9662] RIP: 0033:0x7f4b20a29ae9 [ 2972.745255][ T9662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2972.764892][ T9662] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:41 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003f400000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2972.773312][ T9662] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2972.781305][ T9662] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2972.789372][ T9662] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2972.797506][ T9662] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2972.805570][ T9662] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2972.813630][ T9662] [ 2972.818626][ T9186] device ip6tnl0 left promiscuous mode [ 2972.857392][ T9186] device ip6gre0 left promiscuous mode [ 2973.074773][ T9186] device syz_tun left promiscuous mode [ 2973.103930][ T9186] device ip6gretap0 left promiscuous mode 05:52:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xe045766e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe8c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x400300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 40) 05:52:41 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003fa00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2973.133662][ T9186] bridge0: port 2(bridge_slave_1) entered disabled state [ 2973.140738][ T9186] bridge0: port 1(bridge_slave_0) entered disabled state [ 2973.147858][ T9186] device bridge0 left promiscuous mode [ 2973.164795][ T9202] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:41 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003fc00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2973.237763][T10083] FAULT_INJECTION: forcing a failure. [ 2973.237763][T10083] name failslab, interval 1, probability 0, space 0, times 0 [ 2973.250738][T10083] CPU: 1 PID: 10083 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2973.260640][T10083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.270693][T10083] Call Trace: [ 2973.273974][T10083] [ 2973.276907][T10083] dump_stack_lvl+0xd6/0x122 [ 2973.281495][T10083] dump_stack+0x11/0x1b [ 2973.285636][T10083] should_fail+0x23c/0x250 [ 2973.291433][T10083] ? sctp_add_bind_addr+0x73/0x210 [ 2973.296531][T10083] __should_failslab+0x81/0x90 [ 2973.301314][T10083] should_failslab+0x5/0x20 [ 2973.306199][T10083] kmem_cache_alloc_trace+0x52/0x350 [ 2973.311517][T10083] ? sctp_v4_cmp_addr+0x19/0xb0 [ 2973.316347][T10083] sctp_add_bind_addr+0x73/0x210 [ 2973.321376][T10083] sctp_copy_local_addr_list+0x1ab/0x230 [ 2973.326992][T10083] sctp_copy_one_addr+0x7d/0x3f0 [ 2973.331915][T10083] sctp_bind_addr_copy+0x7c/0x280 [ 2973.336999][T10083] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2973.343115][T10083] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2973.348388][T10083] __sctp_connect+0x416/0xa80 [ 2973.353124][T10083] sctp_setsockopt+0x2e29/0x8870 [ 2973.358105][T10083] sock_common_setsockopt+0x5d/0x70 [ 2973.363283][T10083] ? sock_common_recvmsg+0xe0/0xe0 [ 2973.368436][T10083] __sys_setsockopt+0x209/0x2a0 [ 2973.373340][T10083] __x64_sys_setsockopt+0x62/0x70 [ 2973.378383][T10083] do_syscall_64+0x44/0xd0 [ 2973.382780][T10083] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2973.388654][T10083] RIP: 0033:0x7f4b20a29ae9 [ 2973.393103][T10083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2973.412698][T10083] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2973.421094][T10083] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2973.429113][T10083] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:52:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 41) [ 2973.437073][T10083] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2973.445037][T10083] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2973.452988][T10083] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2973.461081][T10083] 05:52:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe90, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2973.642729][T10194] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x1000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xeaffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x10000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2973.738635][T10402] FAULT_INJECTION: forcing a failure. [ 2973.738635][T10402] name failslab, interval 1, probability 0, space 0, times 0 [ 2973.751450][T10402] CPU: 0 PID: 10402 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2973.761263][T10402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.771520][T10402] Call Trace: [ 2973.774799][T10402] [ 2973.777827][T10402] dump_stack_lvl+0xd6/0x122 [ 2973.782421][T10402] dump_stack+0x11/0x1b 05:52:42 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000003fd00000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2973.786625][T10402] should_fail+0x23c/0x250 [ 2973.791116][T10402] ? sctp_add_bind_addr+0x73/0x210 [ 2973.796234][T10402] __should_failslab+0x81/0x90 [ 2973.801009][T10402] should_failslab+0x5/0x20 [ 2973.805521][T10402] kmem_cache_alloc_trace+0x52/0x350 [ 2973.810814][T10402] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2973.816117][T10402] sctp_add_bind_addr+0x73/0x210 [ 2973.821139][T10402] sctp_copy_local_addr_list+0x1ab/0x230 [ 2973.826810][T10402] sctp_copy_one_addr+0x7d/0x3f0 [ 2973.831756][T10402] ? get_random_bytes+0x65/0x110 [ 2973.836791][T10402] sctp_bind_addr_copy+0x7c/0x280 [ 2973.841816][T10402] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2973.846780][T10515] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2973.847942][T10402] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2973.862503][T10402] __sctp_connect+0x416/0xa80 [ 2973.867245][T10402] sctp_setsockopt+0x2e29/0x8870 [ 2973.872221][T10402] sock_common_setsockopt+0x5d/0x70 [ 2973.877427][T10402] ? sock_common_recvmsg+0xe0/0xe0 [ 2973.882654][T10402] __sys_setsockopt+0x209/0x2a0 05:52:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0xe94, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2973.887596][T10402] __x64_sys_setsockopt+0x62/0x70 [ 2973.892708][T10402] do_syscall_64+0x44/0xd0 [ 2973.897203][T10402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2973.903108][T10402] RIP: 0033:0x7f4b20a29ae9 [ 2973.907526][T10402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2973.927291][T10402] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xefffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2973.935709][T10402] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2973.943832][T10402] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2973.951803][T10402] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2973.959780][T10402] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2973.967751][T10402] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2973.975811][T10402] 05:52:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2974.014816][T10624] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x2, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2974.102582][T10716] device Y4`Ҙ entered promiscuous mode [ 2974.110528][T10716] device tunl0 entered promiscuous mode [ 2974.117796][T10716] device gre0 entered promiscuous mode [ 2974.137622][T10716] device gretap0 entered promiscuous mode [ 2974.145571][T10716] device erspan0 entered promiscuous mode [ 2974.154010][T10716] device ip_vti0 entered promiscuous mode [ 2974.161861][T10716] device ip6_vti0 entered promiscuous mode [ 2974.169990][T10716] device sit0 entered promiscuous mode [ 2974.194840][T10716] device ip6tnl0 entered promiscuous mode [ 2974.203478][T10716] device ip6gre0 entered promiscuous mode [ 2974.229752][T10716] device syz_tun entered promiscuous mode [ 2974.238299][T10716] device ip6gretap0 entered promiscuous mode 05:52:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 42) 05:52:42 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2974.246788][T10716] bridge0: port 2(bridge_slave_1) entered blocking state [ 2974.253858][T10716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2974.261135][T10716] bridge0: port 1(bridge_slave_0) entered blocking state [ 2974.268260][T10716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2974.275613][T10716] device bridge0 entered promiscuous mode [ 2974.287398][T25395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x21000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x3, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2974.471463][T10844] FAULT_INJECTION: forcing a failure. [ 2974.471463][T10844] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.484439][T10844] CPU: 0 PID: 10844 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2974.494686][T10844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.504755][T10844] Call Trace: [ 2974.508038][T10844] [ 2974.510983][T10844] dump_stack_lvl+0xd6/0x122 [ 2974.515582][T10844] dump_stack+0x11/0x1b [ 2974.519743][T10844] should_fail+0x23c/0x250 [ 2974.524173][T10844] ? sctp_add_bind_addr+0x73/0x210 [ 2974.529295][T10844] __should_failslab+0x81/0x90 [ 2974.534071][T10844] should_failslab+0x5/0x20 [ 2974.538585][T10844] kmem_cache_alloc_trace+0x52/0x350 [ 2974.543970][T10844] ? sctp_v4_cmp_addr+0x19/0xb0 [ 2974.548832][T10844] sctp_add_bind_addr+0x73/0x210 [ 2974.553780][T10844] sctp_copy_local_addr_list+0x1ab/0x230 [ 2974.559465][T10844] sctp_copy_one_addr+0x7d/0x3f0 [ 2974.564471][T10844] sctp_bind_addr_copy+0x7c/0x280 [ 2974.569622][T10844] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2974.575742][T10844] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2974.581097][T10844] __sctp_connect+0x416/0xa80 [ 2974.585782][T10844] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2974.591988][T10844] ? sctp_setsockopt+0xf8d/0x8870 [ 2974.597123][T10844] sctp_setsockopt+0x2e29/0x8870 [ 2974.602112][T10844] sock_common_setsockopt+0x5d/0x70 [ 2974.607337][T10844] ? sock_common_recvmsg+0xe0/0xe0 [ 2974.612471][T10844] __sys_setsockopt+0x209/0x2a0 [ 2974.617360][T10844] __x64_sys_setsockopt+0x62/0x70 [ 2974.622430][T10844] do_syscall_64+0x44/0xd0 [ 2974.626929][T10844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2974.632855][T10844] RIP: 0033:0x7f4b20a29ae9 [ 2974.637277][T10844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2974.656888][T10844] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2974.665312][T10844] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2974.673292][T10844] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2974.681270][T10844] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2974.689249][T10844] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2974.697223][T10844] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2974.705233][T10844] 05:52:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf0ffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 43) 05:52:43 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x60000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2974.848267][T11162] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2974.858600][T11162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2974.866247][T11162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x5, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfeffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2974.985255][T11272] FAULT_INJECTION: forcing a failure. [ 2974.985255][T11272] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.998309][T11272] CPU: 0 PID: 11272 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2975.008122][T11272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.018270][T11272] Call Trace: [ 2975.021565][T11272] [ 2975.024492][T11272] dump_stack_lvl+0xd6/0x122 [ 2975.029101][T11272] dump_stack+0x11/0x1b [ 2975.033256][T11272] should_fail+0x23c/0x250 [ 2975.037720][T11272] ? sctp_add_bind_addr+0x73/0x210 [ 2975.042991][T11272] __should_failslab+0x81/0x90 [ 2975.047771][T11272] should_failslab+0x5/0x20 [ 2975.052466][T11272] kmem_cache_alloc_trace+0x52/0x350 [ 2975.057771][T11272] ? sctp_v4_cmp_addr+0x19/0xb0 [ 2975.062633][T11272] sctp_add_bind_addr+0x73/0x210 [ 2975.067578][T11272] sctp_copy_local_addr_list+0x1ab/0x230 [ 2975.073267][T11272] sctp_copy_one_addr+0x7d/0x3f0 [ 2975.078227][T11272] ? get_random_bytes+0x65/0x110 [ 2975.083196][T11272] sctp_bind_addr_copy+0x7c/0x280 [ 2975.088248][T11272] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2975.094325][T11272] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2975.099666][T11272] __sctp_connect+0x416/0xa80 [ 2975.104348][T11272] sctp_setsockopt+0x2e29/0x8870 [ 2975.109290][T11272] sock_common_setsockopt+0x5d/0x70 [ 2975.114550][T11272] ? sock_common_recvmsg+0xe0/0xe0 [ 2975.119717][T11272] __sys_setsockopt+0x209/0x2a0 [ 2975.123332][T11323] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2975.124575][T11272] __x64_sys_setsockopt+0x62/0x70 [ 2975.135125][T11323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2975.136773][T11272] do_syscall_64+0x44/0xd0 [ 2975.136795][T11272] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2975.144190][T11323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2975.148454][T11272] RIP: 0033:0x7f4b20a29ae9 [ 2975.148474][T11272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x65580000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2975.185955][T11272] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2975.194441][T11272] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2975.202635][T11272] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2975.210697][T11272] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2975.218694][T11272] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2975.226693][T11272] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:52:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x6, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 44) [ 2975.234671][T11272] 05:52:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffa888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:43 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2975.409070][T11700] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2975.413832][T11701] FAULT_INJECTION: forcing a failure. [ 2975.413832][T11701] name failslab, interval 1, probability 0, space 0, times 0 [ 2975.419770][T11700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2975.429107][T11701] CPU: 0 PID: 11701 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2975.436522][T11700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2975.446011][T11701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.463390][T11701] Call Trace: [ 2975.466774][T11701] [ 2975.469735][T11701] dump_stack_lvl+0xd6/0x122 [ 2975.474343][T11701] dump_stack+0x11/0x1b [ 2975.478496][T11701] should_fail+0x23c/0x250 [ 2975.483010][T11701] ? sctp_add_bind_addr+0x73/0x210 [ 2975.488147][T11701] __should_failslab+0x81/0x90 [ 2975.493019][T11701] should_failslab+0x5/0x20 [ 2975.497558][T11701] kmem_cache_alloc_trace+0x52/0x350 [ 2975.502941][T11701] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2975.508223][T11701] sctp_add_bind_addr+0x73/0x210 [ 2975.513171][T11701] sctp_copy_local_addr_list+0x1ab/0x230 [ 2975.518817][T11701] sctp_copy_one_addr+0x7d/0x3f0 [ 2975.523766][T11701] ? get_random_bytes+0x65/0x110 [ 2975.528802][T11701] sctp_bind_addr_copy+0x7c/0x280 [ 2975.533872][T11701] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2975.540067][T11701] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2975.545360][T11701] __sctp_connect+0x416/0xa80 [ 2975.550123][T11701] sctp_setsockopt+0x2e29/0x8870 05:52:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x7, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x81000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2975.555113][T11701] sock_common_setsockopt+0x5d/0x70 [ 2975.560343][T11701] ? sock_common_recvmsg+0xe0/0xe0 [ 2975.565505][T11701] __sys_setsockopt+0x209/0x2a0 [ 2975.570367][T11701] __x64_sys_setsockopt+0x62/0x70 [ 2975.575576][T11701] do_syscall_64+0x44/0xd0 [ 2975.580001][T11701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2975.585949][T11701] RIP: 0033:0x7f4b20a29ae9 [ 2975.590364][T11701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:52:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffff7f}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2975.609975][T11701] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2975.618405][T11701] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2975.626375][T11701] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2975.634355][T11701] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2975.642490][T11701] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2975.650862][T11701] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:52:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 45) [ 2975.658889][T11701] 05:52:44 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2975.697553][T11977] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2975.707865][T11977] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2975.715491][T11977] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x8, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88470000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:44 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2975.877471][T12125] FAULT_INJECTION: forcing a failure. [ 2975.877471][T12125] name failslab, interval 1, probability 0, space 0, times 0 [ 2975.890285][T12125] CPU: 1 PID: 12125 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2975.900120][T12125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.910183][T12125] Call Trace: [ 2975.913461][T12125] [ 2975.916385][T12125] dump_stack_lvl+0xd6/0x122 [ 2975.921051][T12125] dump_stack+0x11/0x1b 05:52:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffff9e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2975.925246][T12125] should_fail+0x23c/0x250 [ 2975.929745][T12125] ? sctp_add_bind_addr+0x73/0x210 [ 2975.934883][T12125] __should_failslab+0x81/0x90 [ 2975.939652][T12125] should_failslab+0x5/0x20 [ 2975.944148][T12125] kmem_cache_alloc_trace+0x52/0x350 [ 2975.949459][T12125] ? sctp_v4_cmp_addr+0x19/0xb0 [ 2975.954340][T12125] sctp_add_bind_addr+0x73/0x210 [ 2975.959258][T12125] sctp_copy_local_addr_list+0x1ab/0x230 [ 2975.964921][T12125] sctp_copy_one_addr+0x7d/0x3f0 [ 2975.969908][T12125] ? get_random_bytes+0x65/0x110 [ 2975.974884][T12125] sctp_bind_addr_copy+0x7c/0x280 [ 2975.979979][T12125] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2975.986030][T12125] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2975.991322][T12125] __sctp_connect+0x416/0xa80 [ 2975.995980][T12125] sctp_setsockopt+0x2e29/0x8870 [ 2976.000954][T12125] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2976.007207][T12125] sock_common_setsockopt+0x5d/0x70 [ 2976.012414][T12125] ? sock_common_recvmsg+0xe0/0xe0 [ 2976.017668][T12125] __sys_setsockopt+0x209/0x2a0 [ 2976.022576][T12125] __x64_sys_setsockopt+0x62/0x70 [ 2976.027582][T12125] do_syscall_64+0x44/0xd0 [ 2976.031976][T12125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2976.037932][T12125] RIP: 0033:0x7f4b20a29ae9 [ 2976.042345][T12125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.061961][T12125] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2976.070357][T12125] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 46) [ 2976.078315][T12125] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2976.086270][T12125] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2976.094231][T12125] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2976.102282][T12125] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2976.110344][T12125] 05:52:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2976.246702][T12331] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2976.257405][T12331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2976.264916][T12331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88480000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2976.384701][T12470] FAULT_INJECTION: forcing a failure. [ 2976.384701][T12470] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.397655][T12470] CPU: 0 PID: 12470 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2976.407469][T12470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.417562][T12470] Call Trace: [ 2976.420870][T12470] [ 2976.423806][T12470] dump_stack_lvl+0xd6/0x122 [ 2976.428410][T12470] dump_stack+0x11/0x1b 05:52:44 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2976.432570][T12470] should_fail+0x23c/0x250 [ 2976.437200][T12470] ? sctp_add_bind_addr+0x73/0x210 [ 2976.442412][T12470] __should_failslab+0x81/0x90 [ 2976.447184][T12470] should_failslab+0x5/0x20 [ 2976.451747][T12470] kmem_cache_alloc_trace+0x52/0x350 [ 2976.457024][T12470] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2976.462248][T12470] sctp_add_bind_addr+0x73/0x210 [ 2976.467189][T12470] sctp_copy_local_addr_list+0x1ab/0x230 [ 2976.472903][T12470] sctp_copy_one_addr+0x7d/0x3f0 [ 2976.477890][T12470] ? get_random_bytes+0x65/0x110 [ 2976.482895][T12470] sctp_bind_addr_copy+0x7c/0x280 [ 2976.487920][T12470] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2976.493978][T12470] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2976.499320][T12470] __sctp_connect+0x416/0xa80 [ 2976.504062][T12470] sctp_setsockopt+0x2e29/0x8870 [ 2976.509028][T12470] sock_common_setsockopt+0x5d/0x70 [ 2976.514228][T12470] ? sock_common_recvmsg+0xe0/0xe0 [ 2976.519417][T12470] __sys_setsockopt+0x209/0x2a0 [ 2976.524266][T12470] __x64_sys_setsockopt+0x62/0x70 [ 2976.529336][T12470] do_syscall_64+0x44/0xd0 05:52:45 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2976.533745][T12470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2976.539645][T12470] RIP: 0033:0x7f4b20a29ae9 [ 2976.544064][T12470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.563676][T12470] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2976.572168][T12470] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 47) [ 2976.580160][T12470] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2976.588150][T12470] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2976.596495][T12470] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2976.604473][T12470] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2976.612456][T12470] [ 2976.717802][T12761] FAULT_INJECTION: forcing a failure. [ 2976.717802][T12761] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.730636][T12761] CPU: 1 PID: 12761 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2976.740452][T12761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.750509][T12761] Call Trace: [ 2976.753788][T12761] [ 2976.756721][T12761] dump_stack_lvl+0xd6/0x122 [ 2976.761319][T12761] dump_stack+0x11/0x1b [ 2976.765556][T12761] should_fail+0x23c/0x250 [ 2976.770012][T12761] ? sctp_add_bind_addr+0x73/0x210 [ 2976.775124][T12761] __should_failslab+0x81/0x90 [ 2976.779968][T12761] should_failslab+0x5/0x20 [ 2976.784477][T12761] kmem_cache_alloc_trace+0x52/0x350 [ 2976.790124][T12761] ? sctp_bind_addr_state+0x72/0x100 [ 2976.795455][T12761] sctp_add_bind_addr+0x73/0x210 [ 2976.800476][T12761] sctp_copy_local_addr_list+0x1ab/0x230 [ 2976.806210][T12761] sctp_copy_one_addr+0x7d/0x3f0 [ 2976.811164][T12761] sctp_bind_addr_copy+0x7c/0x280 [ 2976.816234][T12761] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2976.822315][T12761] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2976.827609][T12761] __sctp_connect+0x416/0xa80 [ 2976.832360][T12761] sctp_setsockopt+0x2e29/0x8870 [ 2976.837306][T12761] sock_common_setsockopt+0x5d/0x70 [ 2976.842510][T12761] ? sock_common_recvmsg+0xe0/0xe0 [ 2976.847628][T12761] __sys_setsockopt+0x209/0x2a0 [ 2976.852509][T12761] __x64_sys_setsockopt+0x62/0x70 [ 2976.857542][T12761] do_syscall_64+0x44/0xd0 [ 2976.862008][T12761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2976.867914][T12761] RIP: 0033:0x7f4b20a29ae9 [ 2976.872322][T12761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.892011][T12761] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2976.900452][T12761] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2976.908431][T12761] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:52:45 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 48) [ 2976.916403][T12761] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2976.924380][T12761] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2976.932371][T12761] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2976.940382][T12761] 05:52:45 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2977.052842][T12782] FAULT_INJECTION: forcing a failure. [ 2977.052842][T12782] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.065786][T12782] CPU: 1 PID: 12782 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2977.075610][T12782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.085665][T12782] Call Trace: [ 2977.088942][T12782] [ 2977.091909][T12782] dump_stack_lvl+0xd6/0x122 [ 2977.096501][T12782] dump_stack+0x11/0x1b [ 2977.100709][T12782] should_fail+0x23c/0x250 [ 2977.105133][T12782] ? sctp_add_bind_addr+0x73/0x210 [ 2977.110252][T12782] __should_failslab+0x81/0x90 [ 2977.115042][T12782] should_failslab+0x5/0x20 [ 2977.119618][T12782] kmem_cache_alloc_trace+0x52/0x350 [ 2977.125017][T12782] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2977.130268][T12782] sctp_add_bind_addr+0x73/0x210 [ 2977.135205][T12782] sctp_copy_local_addr_list+0x1ab/0x230 [ 2977.140836][T12782] sctp_copy_one_addr+0x7d/0x3f0 [ 2977.145780][T12782] ? get_random_bytes+0x65/0x110 [ 2977.150709][T12782] sctp_bind_addr_copy+0x7c/0x280 [ 2977.155781][T12782] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2977.161961][T12782] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2977.167237][T12782] __sctp_connect+0x416/0xa80 [ 2977.171949][T12782] sctp_setsockopt+0x2e29/0x8870 [ 2977.176885][T12782] sock_common_setsockopt+0x5d/0x70 [ 2977.182141][T12782] ? sock_common_recvmsg+0xe0/0xe0 [ 2977.187256][T12782] __sys_setsockopt+0x209/0x2a0 [ 2977.192111][T12782] __x64_sys_setsockopt+0x62/0x70 [ 2977.197142][T12782] do_syscall_64+0x44/0xd0 [ 2977.201694][T12782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2977.207589][T12782] RIP: 0033:0x7f4b20a29ae9 [ 2977.212016][T12782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2977.231627][T12782] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2977.240080][T12782] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2977.248096][T12782] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2977.256048][T12782] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2977.264004][T12782] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2977.272024][T12782] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2977.280024][T12782] [ 2977.788801][T12396] bridge0: port 2(bridge_slave_1) entered disabled state [ 2977.795895][T12396] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 49) 05:52:46 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffc3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xb, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x88a8ffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2977.832401][T12547] A link change request failed with some changes committed already. Interface Y4`Ҙ may have been left with an inconsistent configuration, please check. [ 2977.863720][T12973] A link change request failed with some changes committed already. Interface Y4`Ҙ may have been left with an inconsistent configuration, please check. [ 2977.898050][T13186] FAULT_INJECTION: forcing a failure. [ 2977.898050][T13186] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.910849][T13186] CPU: 0 PID: 13186 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2977.920656][T13186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.930723][T13186] Call Trace: [ 2977.934001][T13186] [ 2977.936927][T13186] dump_stack_lvl+0xd6/0x122 [ 2977.941609][T13186] dump_stack+0x11/0x1b 05:52:46 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2977.945818][T13186] should_fail+0x23c/0x250 [ 2977.950308][T13186] ? sctp_add_bind_addr+0x73/0x210 [ 2977.955522][T13186] __should_failslab+0x81/0x90 [ 2977.960305][T13186] should_failslab+0x5/0x20 [ 2977.964819][T13186] kmem_cache_alloc_trace+0x52/0x350 [ 2977.970111][T13186] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2977.975338][T13186] sctp_add_bind_addr+0x73/0x210 [ 2977.980459][T13186] sctp_copy_local_addr_list+0x1ab/0x230 [ 2977.986176][T13186] sctp_copy_one_addr+0x7d/0x3f0 [ 2977.991125][T13186] sctp_bind_addr_copy+0x7c/0x280 [ 2977.996183][T13186] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2978.002384][T13186] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2978.007684][T13186] __sctp_connect+0x416/0xa80 [ 2978.012561][T13186] ? security_sctp_bind_connect+0x58/0xb0 [ 2978.018347][T13186] sctp_setsockopt+0x2e29/0x8870 [ 2978.023348][T13186] sock_common_setsockopt+0x5d/0x70 [ 2978.028561][T13186] ? sock_common_recvmsg+0xe0/0xe0 [ 2978.033741][T13186] __sys_setsockopt+0x209/0x2a0 [ 2978.038673][T13186] __x64_sys_setsockopt+0x62/0x70 [ 2978.043719][T13186] do_syscall_64+0x44/0xd0 [ 2978.048139][T13186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2978.054152][T13186] RIP: 0033:0x7f4b20a29ae9 [ 2978.058583][T13186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2978.078290][T13186] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2978.086771][T13186] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2978.092203][T13293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2978.094741][T13186] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2978.101782][T13293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2978.109705][T13186] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2978.109720][T13186] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2978.117006][T13293] bridge0: port 1(bridge_slave_0) entered blocking state [ 2978.124873][T13186] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:52:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 50) 05:52:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2978.132840][T13293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2978.139845][T13186] [ 2978.166281][T13294] device Y4`Ҙ entered promiscuous mode [ 2978.174874][T13294] device tunl0 entered promiscuous mode [ 2978.182741][T13294] device gre0 entered promiscuous mode 05:52:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffea}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2978.206130][T13294] device gretap0 entered promiscuous mode [ 2978.214396][T13294] device erspan0 entered promiscuous mode [ 2978.222204][T13294] device ip_vti0 entered promiscuous mode [ 2978.229986][T13294] device ip6_vti0 entered promiscuous mode [ 2978.238290][T13294] device sit0 entered promiscuous mode [ 2978.263095][T13294] device ip6tnl0 entered promiscuous mode [ 2978.271380][T13294] device ip6gre0 entered promiscuous mode [ 2978.297270][T13294] device syz_tun entered promiscuous mode [ 2978.305151][T13294] device ip6gretap0 entered promiscuous mode [ 2978.313671][T13294] bridge0: port 2(bridge_slave_1) entered blocking state [ 2978.320708][T13294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2978.327951][T13294] bridge0: port 1(bridge_slave_0) entered blocking state [ 2978.334971][T13294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2978.342269][T13294] device bridge0 entered promiscuous mode 05:52:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x9effffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2978.389038][T13499] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2978.399825][T13499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2978.407504][T13499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2978.438000][T13500] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2978.448058][T13500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2978.455498][T13500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:47 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xb000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2978.647204][T13613] FAULT_INJECTION: forcing a failure. [ 2978.647204][T13613] name failslab, interval 1, probability 0, space 0, times 0 [ 2978.659964][T13613] CPU: 0 PID: 13613 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2978.669783][T13613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2978.679935][T13613] Call Trace: [ 2978.683231][T13613] [ 2978.686157][T13613] dump_stack_lvl+0xd6/0x122 [ 2978.690739][T13613] dump_stack+0x11/0x1b [ 2978.694912][T13613] should_fail+0x23c/0x250 [ 2978.699364][T13613] ? sctp_add_bind_addr+0x73/0x210 [ 2978.704482][T13613] __should_failslab+0x81/0x90 [ 2978.709256][T13613] should_failslab+0x5/0x20 [ 2978.713818][T13613] kmem_cache_alloc_trace+0x52/0x350 [ 2978.719094][T13613] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2978.724366][T13613] sctp_add_bind_addr+0x73/0x210 [ 2978.729312][T13613] sctp_copy_local_addr_list+0x1ab/0x230 [ 2978.734959][T13613] sctp_copy_one_addr+0x7d/0x3f0 [ 2978.739933][T13613] ? get_random_bytes+0x65/0x110 [ 2978.744889][T13613] sctp_bind_addr_copy+0x7c/0x280 [ 2978.749924][T13613] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2978.756008][T13613] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2978.761387][T13613] __sctp_connect+0x416/0xa80 [ 2978.766101][T13613] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2978.772264][T13613] ? sctp_setsockopt+0x1bfd/0x8870 [ 2978.777434][T13613] sctp_setsockopt+0x2e29/0x8870 [ 2978.782450][T13613] sock_common_setsockopt+0x5d/0x70 [ 2978.787704][T13613] ? sock_common_recvmsg+0xe0/0xe0 [ 2978.792843][T13613] __sys_setsockopt+0x209/0x2a0 05:52:47 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2978.797822][T13613] __x64_sys_setsockopt+0x62/0x70 [ 2978.802921][T13613] do_syscall_64+0x44/0xd0 [ 2978.807388][T13613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2978.813331][T13613] RIP: 0033:0x7f4b20a29ae9 [ 2978.817777][T13613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2978.837434][T13613] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:47 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000000d000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 51) [ 2978.845939][T13613] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2978.853916][T13613] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2978.861930][T13613] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2978.869903][T13613] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2978.877903][T13613] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2978.885941][T13613] [ 2979.020449][T13883] FAULT_INJECTION: forcing a failure. [ 2979.020449][T13883] name failslab, interval 1, probability 0, space 0, times 0 [ 2979.033382][T13883] CPU: 1 PID: 13883 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2979.043368][T13883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.053441][T13883] Call Trace: [ 2979.056720][T13883] [ 2979.059650][T13883] dump_stack_lvl+0xd6/0x122 [ 2979.064284][T13883] dump_stack+0x11/0x1b [ 2979.068441][T13883] should_fail+0x23c/0x250 [ 2979.072957][T13883] ? sctp_add_bind_addr+0x73/0x210 [ 2979.078077][T13883] __should_failslab+0x81/0x90 [ 2979.082902][T13883] should_failslab+0x5/0x20 [ 2979.087509][T13883] kmem_cache_alloc_trace+0x52/0x350 [ 2979.092828][T13883] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2979.098079][T13883] sctp_add_bind_addr+0x73/0x210 [ 2979.103030][T13883] sctp_copy_local_addr_list+0x1ab/0x230 [ 2979.108737][T13883] sctp_copy_one_addr+0x7d/0x3f0 [ 2979.113725][T13883] ? get_random_bytes+0x65/0x110 [ 2979.118674][T13883] sctp_bind_addr_copy+0x7c/0x280 [ 2979.123702][T13883] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2979.129849][T13883] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2979.135256][T13883] __sctp_connect+0x416/0xa80 [ 2979.140055][T13883] sctp_setsockopt+0x2e29/0x8870 [ 2979.144998][T13883] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2979.151224][T13883] sock_common_setsockopt+0x5d/0x70 [ 2979.156501][T13883] ? sock_common_recvmsg+0xe0/0xe0 [ 2979.161718][T13883] __sys_setsockopt+0x209/0x2a0 05:52:47 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2979.166580][T13883] __x64_sys_setsockopt+0x62/0x70 [ 2979.171621][T13883] do_syscall_64+0x44/0xd0 [ 2979.176040][T13883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2979.181941][T13883] RIP: 0033:0x7f4b20a29ae9 [ 2979.186357][T13883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2979.206534][T13883] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 52) [ 2979.214957][T13883] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2979.222977][T13883] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2979.230945][T13883] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2979.238921][T13883] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2979.246893][T13883] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2979.254927][T13883] [ 2979.387043][T13957] FAULT_INJECTION: forcing a failure. [ 2979.387043][T13957] name failslab, interval 1, probability 0, space 0, times 0 [ 2979.400067][T13957] CPU: 1 PID: 13957 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2979.409882][T13957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.419947][T13957] Call Trace: [ 2979.423239][T13957] [ 2979.426165][T13957] dump_stack_lvl+0xd6/0x122 [ 2979.430922][T13957] dump_stack+0x11/0x1b [ 2979.435143][T13957] should_fail+0x23c/0x250 [ 2979.439622][T13957] ? sctp_add_bind_addr+0x73/0x210 [ 2979.444791][T13957] __should_failslab+0x81/0x90 [ 2979.449658][T13957] should_failslab+0x5/0x20 [ 2979.454169][T13957] kmem_cache_alloc_trace+0x52/0x350 [ 2979.459594][T13957] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2979.464800][T13957] sctp_add_bind_addr+0x73/0x210 [ 2979.469841][T13957] sctp_copy_local_addr_list+0x1ab/0x230 [ 2979.475489][T13957] sctp_copy_one_addr+0x7d/0x3f0 [ 2979.480429][T13957] ? get_random_bytes+0x65/0x110 [ 2979.485373][T13957] sctp_bind_addr_copy+0x7c/0x280 [ 2979.490402][T13957] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2979.496877][T13957] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2979.502230][T13957] __sctp_connect+0x416/0xa80 [ 2979.507014][T13957] sctp_setsockopt+0x2e29/0x8870 [ 2979.512024][T13957] sock_common_setsockopt+0x5d/0x70 [ 2979.517285][T13957] ? sock_common_recvmsg+0xe0/0xe0 [ 2979.522489][T13957] __sys_setsockopt+0x209/0x2a0 [ 2979.527347][T13957] __x64_sys_setsockopt+0x62/0x70 [ 2979.532381][T13957] do_syscall_64+0x44/0xd0 05:52:48 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2979.536804][T13957] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2979.542702][T13957] RIP: 0033:0x7f4b20a29ae9 [ 2979.547114][T13957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2979.566797][T13957] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2979.575221][T13957] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 53) [ 2979.583238][T13957] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2979.591217][T13957] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2979.599540][T13957] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2979.607587][T13957] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2979.615569][T13957] [ 2979.726666][T14305] FAULT_INJECTION: forcing a failure. [ 2979.726666][T14305] name failslab, interval 1, probability 0, space 0, times 0 [ 2979.739680][T14305] CPU: 1 PID: 14305 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2979.749496][T14305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.759638][T14305] Call Trace: [ 2979.762956][T14305] [ 2979.765866][T14305] dump_stack_lvl+0xd6/0x122 [ 2979.770517][T14305] dump_stack+0x11/0x1b [ 2979.774663][T14305] should_fail+0x23c/0x250 [ 2979.779062][T14305] ? sctp_add_bind_addr+0x73/0x210 [ 2979.784225][T14305] __should_failslab+0x81/0x90 [ 2979.789012][T14305] should_failslab+0x5/0x20 [ 2979.793909][T14305] kmem_cache_alloc_trace+0x52/0x350 [ 2979.799190][T14305] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2979.804445][T14305] sctp_add_bind_addr+0x73/0x210 [ 2979.809432][T14305] sctp_copy_local_addr_list+0x1ab/0x230 [ 2979.815051][T14305] sctp_copy_one_addr+0x7d/0x3f0 [ 2979.819971][T14305] ? get_random_bytes+0x65/0x110 [ 2979.824899][T14305] sctp_bind_addr_copy+0x7c/0x280 [ 2979.829954][T14305] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2979.836009][T14305] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2979.841281][T14305] __sctp_connect+0x416/0xa80 [ 2979.846071][T14305] sctp_setsockopt+0x2e29/0x8870 [ 2979.851040][T14305] sock_common_setsockopt+0x5d/0x70 [ 2979.856222][T14305] ? sock_common_recvmsg+0xe0/0xe0 [ 2979.861316][T14305] __sys_setsockopt+0x209/0x2a0 [ 2979.866210][T14305] __x64_sys_setsockopt+0x62/0x70 [ 2979.871235][T14305] do_syscall_64+0x44/0xd0 [ 2979.875635][T14305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2979.881508][T14305] RIP: 0033:0x7f4b20a29ae9 [ 2979.885913][T14305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2979.905532][T14305] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2979.913963][T14305] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2979.921916][T14305] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2979.929961][T14305] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2979.937945][T14305] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2979.945914][T14305] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2979.953890][T14305] 05:52:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffef}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2980.211773][T13606] bridge0: port 2(bridge_slave_1) entered disabled state [ 2980.218920][T13606] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc3050000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2980.255866][T13616] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.266515][T13616] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2980.274166][T13616] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xd, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:48 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000011000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 54) 05:52:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2980.304175][T10896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2980.315382][T14253] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.325494][T14253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2980.332908][T14253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:48 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000012000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2980.442852][T14365] FAULT_INJECTION: forcing a failure. [ 2980.442852][T14365] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.455758][T14365] CPU: 0 PID: 14365 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2980.465573][T14365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2980.475633][T14365] Call Trace: [ 2980.478908][T14365] [ 2980.481844][T14365] dump_stack_lvl+0xd6/0x122 [ 2980.486519][T14365] dump_stack+0x11/0x1b [ 2980.490662][T14365] should_fail+0x23c/0x250 [ 2980.495693][T14365] ? sctp_add_bind_addr+0x73/0x210 [ 2980.500794][T14365] __should_failslab+0x81/0x90 [ 2980.505600][T14365] should_failslab+0x5/0x20 [ 2980.510162][T14365] kmem_cache_alloc_trace+0x52/0x350 [ 2980.515490][T14365] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2980.520698][T14365] sctp_add_bind_addr+0x73/0x210 [ 2980.525652][T14365] sctp_copy_local_addr_list+0x1ab/0x230 [ 2980.531290][T14365] sctp_copy_one_addr+0x7d/0x3f0 [ 2980.536234][T14365] ? get_random_bytes+0x65/0x110 [ 2980.541225][T14365] sctp_bind_addr_copy+0x7c/0x280 [ 2980.546256][T14365] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2980.552317][T14365] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2980.557611][T14365] __sctp_connect+0x416/0xa80 [ 2980.562287][T14365] sctp_setsockopt+0x2e29/0x8870 [ 2980.567289][T14365] sock_common_setsockopt+0x5d/0x70 [ 2980.572493][T14365] ? sock_common_recvmsg+0xe0/0xe0 [ 2980.577628][T14365] __sys_setsockopt+0x209/0x2a0 [ 2980.582657][T14365] __x64_sys_setsockopt+0x62/0x70 [ 2980.587689][T14365] do_syscall_64+0x44/0xd0 05:52:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xd000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2980.592165][T14365] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2980.598068][T14365] RIP: 0033:0x7f4b20a29ae9 [ 2980.602549][T14365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2980.622173][T14365] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2980.630652][T14365] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 55) 05:52:49 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000001d000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2980.638628][T14365] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2980.646692][T14365] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2980.654810][T14365] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2980.662787][T14365] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2980.670760][T14365] [ 2980.675790][T14475] device Y4`Ҙ left promiscuous mode [ 2980.724711][T14475] device tunl0 left promiscuous mode [ 2980.744181][T14475] device gre0 left promiscuous mode [ 2980.881202][T14591] FAULT_INJECTION: forcing a failure. [ 2980.881202][T14591] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.894401][T14591] CPU: 0 PID: 14591 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2980.904319][T14591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2980.914445][T14591] Call Trace: [ 2980.917725][T14591] [ 2980.920651][T14591] dump_stack_lvl+0xd6/0x122 [ 2980.925244][T14591] dump_stack+0x11/0x1b [ 2980.929407][T14591] should_fail+0x23c/0x250 [ 2980.933828][T14591] ? sctp_add_bind_addr+0x73/0x210 [ 2980.938959][T14591] __should_failslab+0x81/0x90 [ 2980.943735][T14591] should_failslab+0x5/0x20 [ 2980.948245][T14591] kmem_cache_alloc_trace+0x52/0x350 [ 2980.953579][T14591] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2980.958859][T14591] sctp_add_bind_addr+0x73/0x210 [ 2980.963846][T14591] sctp_copy_local_addr_list+0x1ab/0x230 [ 2980.969512][T14591] sctp_copy_one_addr+0x7d/0x3f0 [ 2980.974499][T14591] ? get_random_bytes+0x65/0x110 [ 2980.979451][T14591] sctp_bind_addr_copy+0x7c/0x280 [ 2980.984485][T14591] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2980.990570][T14591] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2980.995996][T14591] __sctp_connect+0x416/0xa80 [ 2981.000690][T14591] sctp_setsockopt+0x2e29/0x8870 [ 2981.005628][T14591] ? sock_common_recvmsg+0xe0/0xe0 [ 2981.010781][T14591] sock_common_setsockopt+0x5d/0x70 [ 2981.016011][T14591] ? sock_common_recvmsg+0xe0/0xe0 [ 2981.021140][T14591] __sys_setsockopt+0x209/0x2a0 [ 2981.026059][T14591] __x64_sys_setsockopt+0x62/0x70 05:52:49 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2981.031099][T14591] do_syscall_64+0x44/0xd0 [ 2981.035519][T14591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2981.041424][T14591] RIP: 0033:0x7f4b20a29ae9 [ 2981.045942][T14591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2981.065674][T14591] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2981.074162][T14591] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:49 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2981.082226][T14591] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2981.090200][T14591] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2981.098175][T14591] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2981.106159][T14591] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2981.114136][T14591] [ 2981.119157][T14475] device gretap0 left promiscuous mode [ 2981.160974][T14475] device erspan0 left promiscuous mode [ 2981.202458][T14475] device ip_vti0 left promiscuous mode [ 2981.231312][T14475] device ip6_vti0 left promiscuous mode [ 2981.279810][T14475] device sit0 left promiscuous mode [ 2981.515407][T14475] device ip6tnl0 left promiscuous mode [ 2981.545606][T14475] device ip6gre0 left promiscuous mode [ 2981.747779][T14475] device syz_tun left promiscuous mode [ 2981.777286][T14475] device ip6gretap0 left promiscuous mode [ 2981.807103][T14475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.814163][T14475] bridge0: port 1(bridge_slave_0) entered disabled state [ 2981.821361][T14475] device bridge0 left promiscuous mode [ 2981.852874][T14476] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2981.866809][T14476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2981.874438][T14476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfffffff0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 56) 05:52:50 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000322000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xc3ffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xf, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xe000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2981.975326][T14477] bridge0: port 2(bridge_slave_1) entered blocking state [ 2981.982439][T14477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2981.989761][T14477] bridge0: port 1(bridge_slave_0) entered blocking state [ 2981.996834][T14477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2982.011859][T28450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:50 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000228000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2982.107326][T15115] device Y4`Ҙ entered promiscuous mode [ 2982.116196][T15115] device tunl0 entered promiscuous mode [ 2982.124026][T15115] device gre0 entered promiscuous mode [ 2982.146081][T15115] device gretap0 entered promiscuous mode [ 2982.153869][T15115] device erspan0 entered promiscuous mode [ 2982.161834][T15115] device ip_vti0 entered promiscuous mode [ 2982.169666][T15115] device ip6_vti0 entered promiscuous mode [ 2982.177977][T15115] device sit0 entered promiscuous mode [ 2982.200633][T15115] device ip6tnl0 entered promiscuous mode [ 2982.208659][T15115] device ip6gre0 entered promiscuous mode [ 2982.234884][T15115] device syz_tun entered promiscuous mode [ 2982.242901][T15115] device ip6gretap0 entered promiscuous mode [ 2982.251239][T15115] bridge0: port 2(bridge_slave_1) entered blocking state [ 2982.258381][T15115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2982.265625][T15115] bridge0: port 1(bridge_slave_0) entered blocking state [ 2982.272674][T15115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2982.280078][T15115] device bridge0 entered promiscuous mode [ 2982.297449][T15218] FAULT_INJECTION: forcing a failure. 05:52:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xd50b0000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2982.297449][T15218] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.313172][T15218] CPU: 0 PID: 15218 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2982.323070][T15218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2982.333205][T15218] Call Trace: [ 2982.336521][T15218] [ 2982.339438][T15218] dump_stack_lvl+0xd6/0x122 [ 2982.344013][T15218] dump_stack+0x11/0x1b [ 2982.348158][T15218] should_fail+0x23c/0x250 [ 2982.352569][T15218] ? sctp_add_bind_addr+0x73/0x210 [ 2982.357673][T15218] __should_failslab+0x81/0x90 [ 2982.362501][T15218] should_failslab+0x5/0x20 [ 2982.367005][T15218] kmem_cache_alloc_trace+0x52/0x350 [ 2982.372482][T15218] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2982.377898][T15218] sctp_add_bind_addr+0x73/0x210 [ 2982.382837][T15218] sctp_copy_local_addr_list+0x1ab/0x230 [ 2982.388609][T15218] sctp_copy_one_addr+0x7d/0x3f0 [ 2982.393621][T15218] sctp_bind_addr_copy+0x7c/0x280 [ 2982.398685][T15218] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2982.404754][T15218] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2982.410037][T15218] __sctp_connect+0x416/0xa80 [ 2982.414772][T15218] sctp_setsockopt+0x2e29/0x8870 [ 2982.419714][T15218] ? security_socket_setsockopt+0x5c/0x90 [ 2982.425443][T15218] sock_common_setsockopt+0x5d/0x70 [ 2982.430777][T15218] ? sock_common_recvmsg+0xe0/0xe0 [ 2982.435894][T15218] __sys_setsockopt+0x209/0x2a0 [ 2982.440804][T15218] __x64_sys_setsockopt+0x62/0x70 [ 2982.445821][T15218] do_syscall_64+0x44/0xd0 [ 2982.449024][T15323] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2982.450308][T15218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2982.461234][T15323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2982.463411][T15218] RIP: 0033:0x7f4b20a29ae9 [ 2982.470920][T15323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2982.475057][T15218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2982.501891][T15218] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x10, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 57) [ 2982.510340][T15218] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2982.518321][T15218] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2982.526294][T15218] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2982.534267][T15218] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2982.542238][T15218] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2982.550216][T15218] 05:52:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:51 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000029000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2982.744141][T15440] FAULT_INJECTION: forcing a failure. [ 2982.744141][T15440] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.757309][T15440] CPU: 1 PID: 15440 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2982.767121][T15440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2982.777260][T15440] Call Trace: [ 2982.780577][T15440] [ 2982.783505][T15440] dump_stack_lvl+0xd6/0x122 [ 2982.788161][T15440] dump_stack+0x11/0x1b [ 2982.792313][T15440] should_fail+0x23c/0x250 [ 2982.796737][T15440] ? sctp_add_bind_addr+0x73/0x210 [ 2982.801871][T15440] __should_failslab+0x81/0x90 [ 2982.806667][T15440] should_failslab+0x5/0x20 [ 2982.811173][T15440] kmem_cache_alloc_trace+0x52/0x350 [ 2982.816475][T15440] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2982.821676][T15440] sctp_add_bind_addr+0x73/0x210 [ 2982.826615][T15440] sctp_copy_local_addr_list+0x1ab/0x230 [ 2982.832251][T15440] sctp_copy_one_addr+0x7d/0x3f0 [ 2982.837266][T15440] ? get_random_bytes+0x65/0x110 [ 2982.842227][T15440] sctp_bind_addr_copy+0x7c/0x280 [ 2982.847272][T15440] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2982.853357][T15440] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2982.858648][T15440] __sctp_connect+0x416/0xa80 [ 2982.863338][T15440] sctp_setsockopt+0x2e29/0x8870 [ 2982.868284][T15440] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2982.874459][T15440] sock_common_setsockopt+0x5d/0x70 [ 2982.879666][T15440] ? sock_common_recvmsg+0xe0/0xe0 [ 2982.884779][T15440] __sys_setsockopt+0x209/0x2a0 [ 2982.889640][T15440] __x64_sys_setsockopt+0x62/0x70 [ 2982.894701][T15440] do_syscall_64+0x44/0xd0 [ 2982.899172][T15440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2982.905054][T15440] RIP: 0033:0x7f4b20a29ae9 [ 2982.909587][T15440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2982.929193][T15440] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2982.937639][T15440] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2982.945659][T15440] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2982.953616][T15440] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2982.961572][T15440] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2982.969548][T15440] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2982.977506][T15440] [ 2983.584036][T15327] bridge0: port 2(bridge_slave_1) entered disabled state [ 2983.591186][T15327] bridge0: port 1(bridge_slave_0) entered disabled state 05:52:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfffffffe}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 58) 05:52:52 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000022a000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2983.628573][T15357] device Y4`Ҙ left promiscuous mode [ 2983.669010][T15357] device tunl0 left promiscuous mode [ 2983.685967][T15756] FAULT_INJECTION: forcing a failure. [ 2983.685967][T15756] name failslab, interval 1, probability 0, space 0, times 0 [ 2983.698884][T15756] CPU: 0 PID: 15756 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2983.708691][T15756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:52:52 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000032000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2983.718748][T15756] Call Trace: [ 2983.722019][T15756] [ 2983.724948][T15756] dump_stack_lvl+0xd6/0x122 [ 2983.729544][T15756] dump_stack+0x11/0x1b [ 2983.733719][T15756] should_fail+0x23c/0x250 [ 2983.738199][T15756] ? sctp_add_bind_addr+0x73/0x210 [ 2983.743327][T15756] __should_failslab+0x81/0x90 [ 2983.748101][T15756] should_failslab+0x5/0x20 [ 2983.752612][T15756] kmem_cache_alloc_trace+0x52/0x350 [ 2983.757954][T15756] sctp_add_bind_addr+0x73/0x210 [ 2983.762903][T15756] sctp_copy_local_addr_list+0x1ab/0x230 [ 2983.768603][T15756] sctp_copy_one_addr+0x7d/0x3f0 [ 2983.773642][T15756] sctp_bind_addr_copy+0x7c/0x280 [ 2983.778717][T15756] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2983.784818][T15756] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2983.790166][T15756] __sctp_connect+0x416/0xa80 [ 2983.794840][T15756] sctp_setsockopt+0x2e29/0x8870 [ 2983.799798][T15756] ? sock_common_setsockopt+0x23/0x70 [ 2983.805179][T15756] sock_common_setsockopt+0x5d/0x70 [ 2983.810382][T15756] ? sock_common_recvmsg+0xe0/0xe0 05:52:52 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2983.815508][T15756] __sys_setsockopt+0x209/0x2a0 [ 2983.820447][T15756] __x64_sys_setsockopt+0x62/0x70 [ 2983.825537][T15756] do_syscall_64+0x44/0xd0 [ 2983.829974][T15756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2983.835886][T15756] RIP: 0033:0x7f4b20a29ae9 [ 2983.840301][T15756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2983.859915][T15756] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2983.868433][T15756] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2983.876436][T15756] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2983.884510][T15756] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2983.892567][T15756] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2983.900650][T15756] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2983.908634][T15756] 05:52:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 59) 05:52:52 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000140000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2983.922789][T15357] device gre0 left promiscuous mode [ 2984.035566][T16073] FAULT_INJECTION: forcing a failure. [ 2984.035566][T16073] name failslab, interval 1, probability 0, space 0, times 0 [ 2984.048452][T16073] CPU: 0 PID: 16073 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2984.058268][T16073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2984.068447][T16073] Call Trace: [ 2984.071724][T16073] [ 2984.074715][T16073] dump_stack_lvl+0xd6/0x122 [ 2984.079315][T16073] dump_stack+0x11/0x1b [ 2984.083540][T16073] should_fail+0x23c/0x250 [ 2984.088015][T16073] ? sctp_add_bind_addr+0x73/0x210 [ 2984.093181][T16073] __should_failslab+0x81/0x90 [ 2984.097953][T16073] should_failslab+0x5/0x20 [ 2984.102563][T16073] kmem_cache_alloc_trace+0x52/0x350 [ 2984.107855][T16073] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2984.113095][T16073] sctp_add_bind_addr+0x73/0x210 [ 2984.118062][T16073] sctp_copy_local_addr_list+0x1ab/0x230 [ 2984.123741][T16073] sctp_copy_one_addr+0x7d/0x3f0 [ 2984.128683][T16073] ? get_random_bytes+0x65/0x110 [ 2984.133647][T16073] sctp_bind_addr_copy+0x7c/0x280 [ 2984.138674][T16073] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2984.144797][T16073] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2984.150096][T16073] __sctp_connect+0x416/0xa80 [ 2984.154789][T16073] sctp_setsockopt+0x2e29/0x8870 [ 2984.159726][T16073] sock_common_setsockopt+0x5d/0x70 [ 2984.164935][T16073] ? sock_common_recvmsg+0xe0/0xe0 [ 2984.170076][T16073] __sys_setsockopt+0x209/0x2a0 [ 2984.174934][T16073] __x64_sys_setsockopt+0x62/0x70 [ 2984.180111][T16073] do_syscall_64+0x44/0xd0 [ 2984.184530][T16073] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2984.190475][T16073] RIP: 0033:0x7f4b20a29ae9 [ 2984.194876][T16073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2984.214492][T16073] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2984.222977][T16073] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2984.230987][T16073] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2984.238960][T16073] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2984.246938][T16073] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2984.254939][T16073] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2984.263047][T16073] [ 2984.269420][T15357] device gretap0 left promiscuous mode [ 2984.304314][T15357] device erspan0 left promiscuous mode [ 2984.342029][T15357] device ip_vti0 left promiscuous mode [ 2984.359431][T15357] device ip6_vti0 left promiscuous mode [ 2984.390804][T15357] device sit0 left promiscuous mode [ 2984.603775][T15357] device ip6tnl0 left promiscuous mode [ 2984.615566][T15357] device ip6gre0 left promiscuous mode [ 2984.826314][T15357] device syz_tun left promiscuous mode [ 2984.856042][T15357] device ip6gretap0 left promiscuous mode 05:52:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xd70b0000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2984.885859][T15357] bridge0: port 2(bridge_slave_1) entered disabled state [ 2984.893040][T15357] bridge0: port 1(bridge_slave_0) entered disabled state [ 2984.900188][T15357] device bridge0 left promiscuous mode [ 2984.918984][T15439] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 2984.927294][T15439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2984.937683][T15439] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2984.945196][T15439] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x12, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:53 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000058000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 60) 05:52:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x10000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2985.056347][T16293] FAULT_INJECTION: forcing a failure. [ 2985.056347][T16293] name failslab, interval 1, probability 0, space 0, times 0 [ 2985.069336][T16293] CPU: 0 PID: 16293 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2985.079217][T16293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2985.089327][T16293] Call Trace: [ 2985.092702][T16293] [ 2985.095635][T16293] dump_stack_lvl+0xd6/0x122 [ 2985.100228][T16293] dump_stack+0x11/0x1b [ 2985.104388][T16293] should_fail+0x23c/0x250 [ 2985.108824][T16293] ? sctp_add_bind_addr+0x73/0x210 [ 2985.114015][T16293] __should_failslab+0x81/0x90 [ 2985.118860][T16293] should_failslab+0x5/0x20 [ 2985.123426][T16293] kmem_cache_alloc_trace+0x52/0x350 [ 2985.128722][T16293] ? sctp_v4_cmp_addr+0x19/0xb0 [ 2985.133581][T16293] sctp_add_bind_addr+0x73/0x210 [ 2985.138599][T16293] sctp_copy_local_addr_list+0x1ab/0x230 [ 2985.144240][T16293] sctp_copy_one_addr+0x7d/0x3f0 [ 2985.149182][T16293] ? get_random_bytes+0x65/0x110 05:52:53 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000064000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2985.154199][T16293] sctp_bind_addr_copy+0x7c/0x280 [ 2985.159229][T16293] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2985.165309][T16293] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2985.170629][T16293] __sctp_connect+0x416/0xa80 [ 2985.175312][T16293] sctp_setsockopt+0x2e29/0x8870 [ 2985.180277][T16293] sock_common_setsockopt+0x5d/0x70 [ 2985.185499][T16293] ? sock_common_recvmsg+0xe0/0xe0 [ 2985.190624][T16293] __sys_setsockopt+0x209/0x2a0 [ 2985.195486][T16293] __x64_sys_setsockopt+0x62/0x70 [ 2985.200526][T16293] do_syscall_64+0x44/0xd0 05:52:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x11000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xeaffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2985.205008][T16293] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2985.210908][T16293] RIP: 0033:0x7f4b20a29ae9 [ 2985.215322][T16293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2985.235086][T16293] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2985.243555][T16293] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 61) 05:52:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2985.247505][T16461] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2985.251528][T16293] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2985.251546][T16293] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2985.251559][T16293] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2985.251571][T16293] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2985.251587][T16293] [ 2985.296098][T16461] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2985.306185][T16461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2985.313570][T16461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2985.344721][T16503] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x13, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2985.354032][T16503] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2985.364083][T16503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2985.371531][T16503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:53 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000166000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x12000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2985.547422][T16716] FAULT_INJECTION: forcing a failure. [ 2985.547422][T16716] name failslab, interval 1, probability 0, space 0, times 0 [ 2985.560482][T16716] CPU: 1 PID: 16716 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2985.570425][T16716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2985.580487][T16716] Call Trace: [ 2985.583759][T16716] [ 2985.586771][T16716] dump_stack_lvl+0xd6/0x122 [ 2985.591360][T16716] dump_stack+0x11/0x1b [ 2985.595508][T16716] should_fail+0x23c/0x250 [ 2985.599933][T16716] ? sctp_add_bind_addr+0x73/0x210 [ 2985.605025][T16716] __should_failslab+0x81/0x90 [ 2985.609804][T16716] should_failslab+0x5/0x20 [ 2985.614383][T16716] kmem_cache_alloc_trace+0x52/0x350 [ 2985.619674][T16716] sctp_add_bind_addr+0x73/0x210 [ 2985.624594][T16716] sctp_copy_local_addr_list+0x1ab/0x230 [ 2985.630222][T16716] sctp_copy_one_addr+0x7d/0x3f0 [ 2985.635291][T16716] ? get_random_bytes+0x65/0x110 [ 2985.640294][T16716] sctp_bind_addr_copy+0x7c/0x280 [ 2985.645393][T16716] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2985.651521][T16716] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2985.656815][T16716] __sctp_connect+0x416/0xa80 [ 2985.661499][T16716] sctp_setsockopt+0x2e29/0x8870 [ 2985.666423][T16716] sock_common_setsockopt+0x5d/0x70 [ 2985.671687][T16716] ? sock_common_recvmsg+0xe0/0xe0 [ 2985.676797][T16716] __sys_setsockopt+0x209/0x2a0 [ 2985.681697][T16716] __x64_sys_setsockopt+0x62/0x70 [ 2985.686712][T16716] do_syscall_64+0x44/0xd0 [ 2985.691130][T16716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2985.697028][T16716] RIP: 0033:0x7f4b20a29ae9 [ 2985.701436][T16716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2985.721026][T16716] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2985.729423][T16716] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2985.737385][T16716] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:52:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 62) [ 2985.745350][T16716] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2985.753335][T16716] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2985.761305][T16716] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2985.769319][T16716] [ 2985.784912][T16719] device Y4`Ҙ entered promiscuous mode [ 2985.802138][T16719] device tunl0 entered promiscuous mode [ 2985.812463][T16719] device gre0 entered promiscuous mode [ 2985.855578][T16719] device gretap0 entered promiscuous mode [ 2985.868953][T16719] device erspan0 entered promiscuous mode [ 2985.883100][T16719] device ip_vti0 entered promiscuous mode [ 2985.895037][T16719] device ip6_vti0 entered promiscuous mode 05:52:54 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000016a000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2985.914508][T16719] device sit0 entered promiscuous mode [ 2985.990770][T16719] device ip6tnl0 entered promiscuous mode [ 2986.004032][T16719] device ip6gre0 entered promiscuous mode [ 2986.023144][T16831] FAULT_INJECTION: forcing a failure. [ 2986.023144][T16831] name failslab, interval 1, probability 0, space 0, times 0 [ 2986.036456][T16831] CPU: 1 PID: 16831 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2986.046310][T16831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2986.056430][T16831] Call Trace: [ 2986.059796][T16831] [ 2986.062715][T16831] dump_stack_lvl+0xd6/0x122 [ 2986.067305][T16831] dump_stack+0x11/0x1b [ 2986.071506][T16831] should_fail+0x23c/0x250 [ 2986.076038][T16831] ? sctp_add_bind_addr+0x73/0x210 [ 2986.081161][T16831] __should_failslab+0x81/0x90 [ 2986.085929][T16831] should_failslab+0x5/0x20 [ 2986.090446][T16831] kmem_cache_alloc_trace+0x52/0x350 [ 2986.095735][T16831] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2986.097592][T16719] device syz_tun entered promiscuous mode [ 2986.100956][T16831] sctp_add_bind_addr+0x73/0x210 [ 2986.100980][T16831] sctp_copy_local_addr_list+0x1ab/0x230 [ 2986.101007][T16831] sctp_copy_one_addr+0x7d/0x3f0 [ 2986.101027][T16831] ? get_random_bytes+0x65/0x110 [ 2986.119463][T16719] device ip6gretap0 entered promiscuous mode [ 2986.122201][T16831] sctp_bind_addr_copy+0x7c/0x280 [ 2986.122227][T16831] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2986.139779][T16719] bridge0: port 2(bridge_slave_1) entered blocking state [ 2986.144197][T16831] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2986.144228][T16831] __sctp_connect+0x416/0xa80 [ 2986.144279][T16831] sctp_setsockopt+0x2e29/0x8870 [ 2986.151303][T16719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2986.156629][T16831] sock_common_setsockopt+0x5d/0x70 [ 2986.156655][T16831] ? sock_common_recvmsg+0xe0/0xe0 [ 2986.161832][T16719] bridge0: port 1(bridge_slave_0) entered blocking state [ 2986.166236][T16831] __sys_setsockopt+0x209/0x2a0 [ 2986.166263][T16831] __x64_sys_setsockopt+0x62/0x70 [ 2986.166288][T16831] do_syscall_64+0x44/0xd0 [ 2986.173526][T16719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2986.178657][T16831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2986.178682][T16831] RIP: 0033:0x7f4b20a29ae9 [ 2986.184203][T16719] device bridge0 entered promiscuous mode 05:52:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x14, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2986.190796][T16831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2986.190871][T16831] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 [ 2986.209072][ T253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2986.212264][T16831] ORIG_RAX: 0000000000000036 [ 2986.212282][T16831] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2986.273956][T16831] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2986.281925][T16831] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 05:52:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x20000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 63) [ 2986.289917][T16831] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2986.297891][T16831] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2986.305868][T16831] 05:52:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xefffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:55 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000017a000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2986.539424][T17144] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2986.549912][T17144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2986.557480][T17144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2986.568317][T17147] FAULT_INJECTION: forcing a failure. [ 2986.568317][T17147] name failslab, interval 1, probability 0, space 0, times 0 [ 2986.581285][T17147] CPU: 1 PID: 17147 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2986.591170][T17147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2986.601263][T17147] Call Trace: [ 2986.604542][T17147] [ 2986.607468][T17147] dump_stack_lvl+0xd6/0x122 [ 2986.612060][T17147] dump_stack+0x11/0x1b [ 2986.616216][T17147] should_fail+0x23c/0x250 [ 2986.620705][T17147] ? sctp_add_bind_addr+0x73/0x210 [ 2986.625860][T17147] __should_failslab+0x81/0x90 [ 2986.630701][T17147] should_failslab+0x5/0x20 [ 2986.635322][T17147] kmem_cache_alloc_trace+0x52/0x350 [ 2986.640609][T17147] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2986.646766][T17147] sctp_add_bind_addr+0x73/0x210 [ 2986.651709][T17147] sctp_copy_local_addr_list+0x1ab/0x230 [ 2986.657347][T17147] sctp_copy_one_addr+0x7d/0x3f0 [ 2986.662298][T17147] sctp_bind_addr_copy+0x7c/0x280 [ 2986.667315][T17147] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2986.673465][T17147] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2986.678737][T17147] __sctp_connect+0x416/0xa80 [ 2986.683409][T17147] sctp_setsockopt+0x2e29/0x8870 [ 2986.688436][T17147] ? security_socket_setsockopt+0x5c/0x90 [ 2986.694198][T17147] sock_common_setsockopt+0x5d/0x70 [ 2986.699381][T17147] ? sock_common_recvmsg+0xe0/0xe0 [ 2986.704495][T17147] __sys_setsockopt+0x209/0x2a0 [ 2986.709403][T17147] __x64_sys_setsockopt+0x62/0x70 [ 2986.714493][T17147] do_syscall_64+0x44/0xd0 [ 2986.718953][T17147] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2986.724878][T17147] RIP: 0033:0x7f4b20a29ae9 [ 2986.729272][T17147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2986.748860][T17147] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2986.757302][T17147] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2986.765270][T17147] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2986.773259][T17147] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2986.781216][T17147] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 05:52:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 64) [ 2986.789280][T17147] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2986.797260][T17147] 05:52:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x15, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x21000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf0ce7efb}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:55 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000382000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2987.036837][T17464] FAULT_INJECTION: forcing a failure. [ 2987.036837][T17464] name failslab, interval 1, probability 0, space 0, times 0 [ 2987.045363][T17466] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2987.049711][T17464] CPU: 1 PID: 17464 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2987.060301][T17466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2987.066681][T17464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2987.066696][T17464] Call Trace: [ 2987.066702][T17464] [ 2987.066720][T17464] dump_stack_lvl+0xd6/0x122 [ 2987.074246][T17466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2987.084046][T17464] dump_stack+0x11/0x1b [ 2987.084084][T17464] should_fail+0x23c/0x250 [ 2987.084107][T17464] ? sctp_add_bind_addr+0x73/0x210 [ 2987.115758][T17464] __should_failslab+0x81/0x90 [ 2987.120530][T17464] should_failslab+0x5/0x20 [ 2987.125087][T17464] kmem_cache_alloc_trace+0x52/0x350 [ 2987.130377][T17464] ? __sctp_v6_cmp_addr+0x148/0x2c0 05:52:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x25000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2987.135775][T17464] sctp_add_bind_addr+0x73/0x210 [ 2987.140710][T17464] sctp_copy_local_addr_list+0x1ab/0x230 [ 2987.146354][T17464] sctp_copy_one_addr+0x7d/0x3f0 [ 2987.151357][T17464] ? get_random_bytes+0x65/0x110 [ 2987.156399][T17464] sctp_bind_addr_copy+0x7c/0x280 [ 2987.161447][T17464] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2987.167552][T17464] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2987.172849][T17464] __sctp_connect+0x416/0xa80 [ 2987.177530][T17464] ? __sanitizer_cov_trace_const_cmp2+0xa0/0xa0 05:52:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x16, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2987.183840][T17464] sctp_setsockopt+0x2e29/0x8870 [ 2987.188785][T17464] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2987.195000][T17464] ? sock_common_recvmsg+0xe0/0xe0 [ 2987.200099][T17464] sock_common_setsockopt+0x5d/0x70 [ 2987.205327][T17464] ? sock_common_recvmsg+0xe0/0xe0 [ 2987.210479][T17464] __sys_setsockopt+0x209/0x2a0 [ 2987.215320][T17464] __x64_sys_setsockopt+0x62/0x70 [ 2987.220429][T17464] do_syscall_64+0x44/0xd0 [ 2987.224866][T17464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2987.230821][T17464] RIP: 0033:0x7f4b20a29ae9 [ 2987.235259][T17464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2987.254960][T17464] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2987.263362][T17464] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2987.271319][T17464] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2987.279292][T17464] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 05:52:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 65) [ 2987.287334][T17464] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2987.295332][T17464] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2987.303420][T17464] [ 2987.318947][T17569] device Y4`Ҙ left promiscuous mode [ 2987.331317][T17569] device tunl0 left promiscuous mode [ 2987.340096][T17569] device gre0 left promiscuous mode [ 2987.351844][T17569] device gretap0 left promiscuous mode [ 2987.360036][T17569] device erspan0 left promiscuous mode [ 2987.370157][T17569] device ip_vti0 left promiscuous mode [ 2987.378616][T17569] device ip6_vti0 left promiscuous mode [ 2987.388974][T17569] device sit0 left promiscuous mode [ 2987.397625][T17569] device ip6tnl0 left promiscuous mode [ 2987.407247][T17569] device ip6gre0 left promiscuous mode [ 2987.416347][T17569] device syz_tun left promiscuous mode [ 2987.424867][T17569] device ip6gretap0 left promiscuous mode [ 2987.435007][T17569] device bridge0 left promiscuous mode 05:52:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xf0ffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2987.553666][T17783] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2987.563969][T17783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2987.571467][T17783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2987.579036][T17784] FAULT_INJECTION: forcing a failure. [ 2987.579036][T17784] name failslab, interval 1, probability 0, space 0, times 0 [ 2987.591782][T17784] CPU: 1 PID: 17784 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 05:52:56 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000088000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x48000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2987.601586][T17784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2987.611638][T17784] Call Trace: [ 2987.614937][T17784] [ 2987.617867][T17784] dump_stack_lvl+0xd6/0x122 [ 2987.622583][T17784] dump_stack+0x11/0x1b [ 2987.626736][T17784] should_fail+0x23c/0x250 [ 2987.631155][T17784] ? sctp_add_bind_addr+0x73/0x210 [ 2987.636366][T17784] __should_failslab+0x81/0x90 [ 2987.641157][T17784] should_failslab+0x5/0x20 [ 2987.645644][T17784] kmem_cache_alloc_trace+0x52/0x350 [ 2987.650909][T17784] ? sctp_bind_addr_state+0x87/0x100 [ 2987.656212][T17784] sctp_add_bind_addr+0x73/0x210 [ 2987.661149][T17784] sctp_copy_local_addr_list+0x1ab/0x230 [ 2987.666765][T17784] sctp_copy_one_addr+0x7d/0x3f0 [ 2987.671694][T17784] ? get_random_bytes+0x65/0x110 [ 2987.676649][T17784] sctp_bind_addr_copy+0x7c/0x280 [ 2987.681708][T17784] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2987.687834][T17784] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2987.693114][T17784] __sctp_connect+0x416/0xa80 [ 2987.697905][T17784] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2987.704113][T17784] ? sctp_setsockopt+0x1bfd/0x8870 [ 2987.709221][T17784] sctp_setsockopt+0x2e29/0x8870 [ 2987.714217][T17784] sock_common_setsockopt+0x5d/0x70 [ 2987.719472][T17784] ? sock_common_recvmsg+0xe0/0xe0 [ 2987.724619][T17784] __sys_setsockopt+0x209/0x2a0 [ 2987.729528][T17784] __x64_sys_setsockopt+0x62/0x70 [ 2987.734535][T17784] do_syscall_64+0x44/0xd0 [ 2987.738963][T17784] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2987.744856][T17784] RIP: 0033:0x7f4b20a29ae9 [ 2987.749344][T17784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2987.768931][T17784] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2987.777328][T17784] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2987.785280][T17784] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2987.793232][T17784] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 05:52:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 66) 05:52:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x1a, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2987.801189][T17784] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2987.809141][T17784] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2987.817101][T17784] [ 2987.978527][T17888] device Y4`Ҙ entered promiscuous mode [ 2987.991868][T17888] device tunl0 entered promiscuous mode [ 2988.006489][T17888] device gre0 entered promiscuous mode [ 2988.020907][T17888] device gretap0 entered promiscuous mode [ 2988.034270][T17888] device erspan0 entered promiscuous mode [ 2988.050020][T17888] device ip_vti0 entered promiscuous mode [ 2988.064780][T17888] device ip6_vti0 entered promiscuous mode [ 2988.078750][T17888] device sit0 entered promiscuous mode [ 2988.095200][T17888] device ip6tnl0 entered promiscuous mode [ 2988.108293][T17905] FAULT_INJECTION: forcing a failure. [ 2988.108293][T17905] name failslab, interval 1, probability 0, space 0, times 0 [ 2988.112470][T17888] device ip6gre0 entered promiscuous mode [ 2988.121015][T17905] CPU: 1 PID: 17905 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2988.121076][T17905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2988.121089][T17905] Call Trace: [ 2988.121096][T17905] [ 2988.121103][T17905] dump_stack_lvl+0xd6/0x122 [ 2988.137200][T17888] device syz_tun entered promiscuous mode [ 2988.146679][T17905] dump_stack+0x11/0x1b [ 2988.146702][T17905] should_fail+0x23c/0x250 [ 2988.146727][T17905] ? sctp_add_bind_addr+0x73/0x210 [ 2988.146799][T17905] __should_failslab+0x81/0x90 [ 2988.158930][T17888] device ip6gretap0 entered promiscuous mode [ 2988.163227][T17905] should_failslab+0x5/0x20 [ 2988.163256][T17905] kmem_cache_alloc_trace+0x52/0x350 [ 2988.175551][T17888] device bridge0 entered promiscuous mode [ 2988.176907][T17905] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2988.176933][T17905] sctp_add_bind_addr+0x73/0x210 [ 2988.213228][T17905] sctp_copy_local_addr_list+0x1ab/0x230 [ 2988.218926][T17905] sctp_copy_one_addr+0x7d/0x3f0 [ 2988.223861][T17905] sctp_bind_addr_copy+0x7c/0x280 [ 2988.228914][T17905] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2988.235331][T17905] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2988.240633][T17905] __sctp_connect+0x416/0xa80 [ 2988.245317][T17905] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2988.251484][T17905] sctp_setsockopt+0x2e29/0x8870 [ 2988.252263][T17904] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2988.256437][T17905] sock_common_setsockopt+0x5d/0x70 [ 2988.256463][T17905] ? sock_common_recvmsg+0xe0/0xe0 [ 2988.267063][T17904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2988.268851][T17905] __sys_setsockopt+0x209/0x2a0 [ 2988.274144][T17904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2988.281210][T17905] __x64_sys_setsockopt+0x62/0x70 [ 2988.281233][T17905] do_syscall_64+0x44/0xd0 [ 2988.302778][T17905] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2988.308671][T17905] RIP: 0033:0x7f4b20a29ae9 [ 2988.313092][T17905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2988.332713][T17905] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:56 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000038c000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4c000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x1b, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfb7ecef0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2988.341133][T17905] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2988.349279][T17905] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2988.357253][T17905] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2988.365271][T17905] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2988.373340][T17905] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2988.381451][T17905] 05:52:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 67) [ 2988.528945][T18216] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2988.539537][T18216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2988.547076][T18216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2988.585117][T18305] FAULT_INJECTION: forcing a failure. [ 2988.585117][T18305] name failslab, interval 1, probability 0, space 0, times 0 [ 2988.598061][T18305] CPU: 0 PID: 18305 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2988.607871][T18305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2988.617939][T18305] Call Trace: [ 2988.621216][T18305] [ 2988.624142][T18305] dump_stack_lvl+0xd6/0x122 [ 2988.628732][T18305] dump_stack+0x11/0x1b 05:52:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000190000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x60000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2988.632919][T18305] should_fail+0x23c/0x250 [ 2988.637364][T18305] ? sctp_add_bind_addr+0x73/0x210 [ 2988.642570][T18305] __should_failslab+0x81/0x90 [ 2988.647345][T18305] should_failslab+0x5/0x20 [ 2988.651854][T18305] kmem_cache_alloc_trace+0x52/0x350 [ 2988.657175][T18305] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2988.662377][T18305] sctp_add_bind_addr+0x73/0x210 [ 2988.667320][T18305] sctp_copy_local_addr_list+0x1ab/0x230 [ 2988.672984][T18305] sctp_copy_one_addr+0x7d/0x3f0 [ 2988.677948][T18305] sctp_bind_addr_copy+0x7c/0x280 05:52:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x1c, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2988.682974][T18305] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2988.689117][T18305] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2988.694447][T18305] __sctp_connect+0x416/0xa80 [ 2988.699130][T18305] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2988.705287][T18305] sctp_setsockopt+0x2e29/0x8870 [ 2988.710285][T18305] sock_common_setsockopt+0x5d/0x70 [ 2988.715538][T18305] ? sock_common_recvmsg+0xe0/0xe0 [ 2988.720702][T18305] __sys_setsockopt+0x209/0x2a0 [ 2988.725624][T18305] __x64_sys_setsockopt+0x62/0x70 [ 2988.730808][T18305] do_syscall_64+0x44/0xd0 [ 2988.735216][T18305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2988.741152][T18305] RIP: 0033:0x7f4b20a29ae9 [ 2988.745566][T18305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2988.765235][T18305] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2988.773784][T18305] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:52:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000098000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 68) [ 2988.781860][T18305] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2988.789846][T18305] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2988.797828][T18305] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2988.805803][T18305] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2988.813785][T18305] [ 2988.818113][T18263] device Y4`Ҙ left promiscuous mode [ 2988.856018][T18263] device tunl0 left promiscuous mode [ 2988.878472][T18263] device gre0 left promiscuous mode [ 2988.977074][T18629] FAULT_INJECTION: forcing a failure. [ 2988.977074][T18629] name failslab, interval 1, probability 0, space 0, times 0 [ 2988.989818][T18629] CPU: 0 PID: 18629 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2988.999652][T18629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2989.009706][T18629] Call Trace: [ 2989.012988][T18629] [ 2989.015915][T18629] dump_stack_lvl+0xd6/0x122 [ 2989.020538][T18629] dump_stack+0x11/0x1b [ 2989.024695][T18629] should_fail+0x23c/0x250 [ 2989.029120][T18629] ? sctp_add_bind_addr+0x73/0x210 [ 2989.034304][T18629] __should_failslab+0x81/0x90 [ 2989.039154][T18629] should_failslab+0x5/0x20 [ 2989.043992][T18629] kmem_cache_alloc_trace+0x52/0x350 [ 2989.049286][T18629] sctp_add_bind_addr+0x73/0x210 [ 2989.054365][T18629] sctp_copy_local_addr_list+0x1ab/0x230 [ 2989.060008][T18629] sctp_copy_one_addr+0x7d/0x3f0 [ 2989.065054][T18629] ? get_random_bytes+0x65/0x110 [ 2989.070004][T18629] sctp_bind_addr_copy+0x7c/0x280 [ 2989.075065][T18629] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2989.081144][T18629] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2989.086442][T18629] __sctp_connect+0x416/0xa80 [ 2989.091202][T18629] sctp_setsockopt+0x2e29/0x8870 [ 2989.096140][T18629] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2989.102302][T18629] ? sock_common_recvmsg+0xe0/0xe0 [ 2989.107422][T18629] sock_common_setsockopt+0x5d/0x70 [ 2989.112763][T18629] ? sock_common_recvmsg+0xe0/0xe0 [ 2989.117959][T18629] __sys_setsockopt+0x209/0x2a0 [ 2989.122817][T18629] __x64_sys_setsockopt+0x62/0x70 05:52:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000000000000198000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2989.127909][T18629] do_syscall_64+0x44/0xd0 [ 2989.132324][T18629] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2989.138268][T18629] RIP: 0033:0x7f4b20a29ae9 [ 2989.142687][T18629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2989.162324][T18629] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:52:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000000000000039c000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 69) [ 2989.170955][T18629] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2989.178927][T18629] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2989.186909][T18629] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2989.194885][T18629] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2989.202931][T18629] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2989.210915][T18629] [ 2989.215525][T18263] device gretap0 left promiscuous mode [ 2989.259329][T18263] device erspan0 left promiscuous mode [ 2989.290846][T18263] device ip_vti0 left promiscuous mode [ 2989.311426][T18263] device ip6_vti0 left promiscuous mode [ 2989.344293][T18263] device sit0 left promiscuous mode 05:52:57 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000000aa000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2989.401913][T18755] FAULT_INJECTION: forcing a failure. [ 2989.401913][T18755] name failslab, interval 1, probability 0, space 0, times 0 [ 2989.414767][T18755] CPU: 1 PID: 18755 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2989.424588][T18755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2989.434635][T18755] Call Trace: [ 2989.437910][T18755] [ 2989.440894][T18755] dump_stack_lvl+0xd6/0x122 [ 2989.445484][T18755] dump_stack+0x11/0x1b [ 2989.449686][T18755] should_fail+0x23c/0x250 [ 2989.454135][T18755] ? sctp_add_bind_addr+0x73/0x210 [ 2989.459317][T18755] __should_failslab+0x81/0x90 [ 2989.464099][T18755] should_failslab+0x5/0x20 [ 2989.468598][T18755] kmem_cache_alloc_trace+0x52/0x350 [ 2989.473867][T18755] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2989.480023][T18755] sctp_add_bind_addr+0x73/0x210 [ 2989.484954][T18755] sctp_copy_local_addr_list+0x1ab/0x230 [ 2989.490623][T18755] sctp_copy_one_addr+0x7d/0x3f0 [ 2989.495582][T18755] ? get_random_bytes+0x65/0x110 [ 2989.500550][T18755] sctp_bind_addr_copy+0x7c/0x280 [ 2989.505651][T18755] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2989.511723][T18755] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2989.517041][T18755] __sctp_connect+0x416/0xa80 [ 2989.521760][T18755] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2989.527921][T18755] ? sctp_setsockopt+0x1bfd/0x8870 [ 2989.533041][T18755] sctp_setsockopt+0x2e29/0x8870 [ 2989.538015][T18755] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2989.544173][T18755] ? sock_common_recvmsg+0xe0/0xe0 [ 2989.549267][T18755] sock_common_setsockopt+0x5d/0x70 [ 2989.554484][T18755] ? sock_common_recvmsg+0xe0/0xe0 [ 2989.559701][T18755] __sys_setsockopt+0x209/0x2a0 [ 2989.564607][T18755] __x64_sys_setsockopt+0x62/0x70 [ 2989.569645][T18755] do_syscall_64+0x44/0xd0 [ 2989.574064][T18755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2989.580009][T18755] RIP: 0033:0x7f4b20a29ae9 [ 2989.584445][T18755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2989.604042][T18755] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2989.612448][T18755] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2989.620413][T18755] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2989.628409][T18755] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2989.636369][T18755] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2989.644339][T18755] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2989.652303][T18755] [ 2989.848858][T18263] device ip6tnl0 left promiscuous mode [ 2989.878599][T18263] device ip6gre0 left promiscuous mode [ 2990.087518][T18263] device syz_tun left promiscuous mode [ 2990.117019][T18263] device ip6gretap0 left promiscuous mode [ 2990.145533][T18263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2990.152604][T18263] bridge0: port 1(bridge_slave_0) entered disabled state [ 2990.159813][T18263] device bridge0 left promiscuous mode 05:52:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfeffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 70) 05:52:58 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003c0000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x1d, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x65580000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2990.249325][T19177] FAULT_INJECTION: forcing a failure. [ 2990.249325][T19177] name failslab, interval 1, probability 0, space 0, times 0 [ 2990.262273][T19177] CPU: 1 PID: 19177 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2990.272087][T19177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2990.282152][T19177] Call Trace: [ 2990.285414][T19177] [ 2990.288379][T19177] dump_stack_lvl+0xd6/0x122 [ 2990.292955][T19177] dump_stack+0x11/0x1b [ 2990.297092][T19177] should_fail+0x23c/0x250 [ 2990.301502][T19177] ? sctp_add_bind_addr+0x73/0x210 [ 2990.306684][T19177] __should_failslab+0x81/0x90 [ 2990.311529][T19177] should_failslab+0x5/0x20 [ 2990.316034][T19177] kmem_cache_alloc_trace+0x52/0x350 [ 2990.321527][T19177] sctp_add_bind_addr+0x73/0x210 [ 2990.326505][T19177] sctp_copy_local_addr_list+0x1ab/0x230 [ 2990.332194][T19177] sctp_copy_one_addr+0x7d/0x3f0 [ 2990.338569][T19177] ? get_random_bytes+0x65/0x110 [ 2990.343825][T19177] sctp_bind_addr_copy+0x7c/0x280 [ 2990.348862][T19177] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2990.354996][T19177] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2990.360298][T19177] __sctp_connect+0x416/0xa80 [ 2990.365040][T19177] sctp_setsockopt+0x2e29/0x8870 [ 2990.369989][T19177] sock_common_setsockopt+0x5d/0x70 [ 2990.375228][T19177] ? sock_common_recvmsg+0xe0/0xe0 [ 2990.380468][T19177] __sys_setsockopt+0x209/0x2a0 [ 2990.385376][T19177] __x64_sys_setsockopt+0x62/0x70 [ 2990.390409][T19177] do_syscall_64+0x44/0xd0 [ 2990.394826][T19177] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2990.400712][T19177] RIP: 0033:0x7f4b20a29ae9 [ 2990.405321][T19177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2990.424961][T19177] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2990.433388][T19177] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2990.441444][T19177] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:52:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 71) 05:52:59 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000001ca000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2990.449444][T19177] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2990.457428][T19177] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2990.465401][T19177] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2990.473383][T19177] [ 2990.675536][T19286] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2990.685708][T19286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2990.693207][T19286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x39, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x68000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2990.759469][T19291] device Y4`Ҙ entered promiscuous mode [ 2990.776819][T19291] device tunl0 entered promiscuous mode [ 2990.794057][T19291] device gre0 entered promiscuous mode [ 2990.806982][T19297] FAULT_INJECTION: forcing a failure. [ 2990.806982][T19297] name failslab, interval 1, probability 0, space 0, times 0 [ 2990.819852][T19297] CPU: 1 PID: 19297 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2990.829711][T19297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2990.839852][T19297] Call Trace: [ 2990.843126][T19297] [ 2990.846047][T19297] dump_stack_lvl+0xd6/0x122 [ 2990.850663][T19297] dump_stack+0x11/0x1b [ 2990.854811][T19297] should_fail+0x23c/0x250 [ 2990.859242][T19297] ? sctp_add_bind_addr+0x73/0x210 [ 2990.864353][T19297] __should_failslab+0x81/0x90 [ 2990.869144][T19297] should_failslab+0x5/0x20 [ 2990.872317][T19291] device gretap0 entered promiscuous mode [ 2990.873652][T19297] kmem_cache_alloc_trace+0x52/0x350 [ 2990.873679][T19297] sctp_add_bind_addr+0x73/0x210 [ 2990.873725][T19297] sctp_copy_local_addr_list+0x1ab/0x230 [ 2990.890812][T19291] device erspan0 entered promiscuous mode [ 2990.895312][T19297] sctp_copy_one_addr+0x7d/0x3f0 [ 2990.895338][T19297] ? get_random_bytes+0x65/0x110 [ 2990.895370][T19297] sctp_bind_addr_copy+0x7c/0x280 [ 2990.895391][T19297] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2990.912033][T19291] device ip_vti0 entered promiscuous mode [ 2990.915908][T19297] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2990.915949][T19297] __sctp_connect+0x416/0xa80 [ 2990.932430][T19291] device ip6_vti0 entered promiscuous mode [ 2990.933015][T19297] sctp_setsockopt+0x2e29/0x8870 [ 2990.933042][T19297] sock_common_setsockopt+0x5d/0x70 [ 2990.933066][T19297] ? sock_common_recvmsg+0xe0/0xe0 [ 2990.933119][T19297] __sys_setsockopt+0x209/0x2a0 [ 2990.948519][T19291] device sit0 entered promiscuous mode [ 2990.953650][T19297] __x64_sys_setsockopt+0x62/0x70 [ 2990.953679][T19297] do_syscall_64+0x44/0xd0 [ 2990.953707][T19297] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2990.953759][T19297] RIP: 0033:0x7f4b20a29ae9 [ 2990.988800][T19297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2991.008428][T19297] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2991.016966][T19297] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2991.024992][T19297] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2991.032961][T19297] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2991.036108][T19291] device ip6tnl0 entered promiscuous mode [ 2991.040927][T19297] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 05:52:59 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003ca000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 72) [ 2991.040942][T19297] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2991.040975][T19297] [ 2991.080008][T19291] device ip6gre0 entered promiscuous mode [ 2991.136289][T19291] device syz_tun entered promiscuous mode [ 2991.149422][T19291] device ip6gretap0 entered promiscuous mode [ 2991.162872][T19291] bridge0: port 2(bridge_slave_1) entered blocking state [ 2991.169963][T19291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2991.177653][T19291] bridge0: port 1(bridge_slave_0) entered blocking state [ 2991.184752][T19291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2991.192461][T19291] device bridge0 entered promiscuous mode [ 2991.207596][ T253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:52:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffa888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2991.263235][T19602] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2991.274267][T19602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2991.281919][T19602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:52:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x8cc, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:52:59 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003cc000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:52:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6c000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2991.348873][T19608] FAULT_INJECTION: forcing a failure. [ 2991.348873][T19608] name failslab, interval 1, probability 0, space 0, times 0 [ 2991.361654][T19608] CPU: 1 PID: 19608 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2991.371467][T19608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2991.381531][T19608] Call Trace: [ 2991.384811][T19608] [ 2991.387740][T19608] dump_stack_lvl+0xd6/0x122 [ 2991.392335][T19608] dump_stack+0x11/0x1b [ 2991.396483][T19608] should_fail+0x23c/0x250 [ 2991.400949][T19608] ? sctp_add_bind_addr+0x73/0x210 [ 2991.406142][T19608] __should_failslab+0x81/0x90 [ 2991.410937][T19608] should_failslab+0x5/0x20 [ 2991.415501][T19608] kmem_cache_alloc_trace+0x52/0x350 [ 2991.420831][T19608] ? sctp_bind_addr_state+0x87/0x100 [ 2991.426096][T19608] sctp_add_bind_addr+0x73/0x210 [ 2991.431069][T19608] sctp_copy_local_addr_list+0x1ab/0x230 [ 2991.436710][T19608] sctp_copy_one_addr+0x7d/0x3f0 [ 2991.441646][T19608] ? get_random_bytes+0x65/0x110 [ 2991.446568][T19608] sctp_bind_addr_copy+0x7c/0x280 [ 2991.451592][T19608] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2991.457705][T19608] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2991.462976][T19608] __sctp_connect+0x416/0xa80 [ 2991.467633][T19608] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2991.473948][T19608] sctp_setsockopt+0x2e29/0x8870 [ 2991.478895][T19608] sock_common_setsockopt+0x5d/0x70 [ 2991.484097][T19608] ? sock_common_recvmsg+0xe0/0xe0 [ 2991.489226][T19608] __sys_setsockopt+0x209/0x2a0 [ 2991.494064][T19608] __x64_sys_setsockopt+0x62/0x70 [ 2991.499149][T19608] do_syscall_64+0x44/0xd0 [ 2991.503561][T19608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2991.509439][T19608] RIP: 0033:0x7f4b20a29ae9 [ 2991.513844][T19608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2991.533431][T19608] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2991.541963][T19608] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 73) [ 2991.549932][T19608] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2991.557890][T19608] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2991.565876][T19608] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2991.573870][T19608] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2991.581879][T19608] 05:53:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2991.765009][T19752] device Y4`Ҙ left promiscuous mode [ 2991.820679][T19752] device tunl0 left promiscuous mode [ 2991.840904][T19752] device gre0 left promiscuous mode 05:53:00 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000000d4000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2991.896822][T19829] FAULT_INJECTION: forcing a failure. [ 2991.896822][T19829] name failslab, interval 1, probability 0, space 0, times 0 [ 2991.909584][T19829] CPU: 1 PID: 19829 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2991.919387][T19829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2991.929541][T19829] Call Trace: [ 2991.932816][T19829] [ 2991.935743][T19829] dump_stack_lvl+0xd6/0x122 [ 2991.940341][T19829] dump_stack+0x11/0x1b [ 2991.944668][T19829] should_fail+0x23c/0x250 [ 2991.949079][T19829] ? sctp_add_bind_addr+0x73/0x210 [ 2991.954325][T19829] __should_failslab+0x81/0x90 [ 2991.959101][T19829] should_failslab+0x5/0x20 [ 2991.963628][T19829] kmem_cache_alloc_trace+0x52/0x350 [ 2991.968948][T19829] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2991.974291][T19829] sctp_add_bind_addr+0x73/0x210 [ 2991.979385][T19829] sctp_copy_local_addr_list+0x1ab/0x230 [ 2991.985017][T19829] sctp_copy_one_addr+0x7d/0x3f0 [ 2991.989936][T19829] sctp_bind_addr_copy+0x7c/0x280 [ 2991.994945][T19829] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2992.001220][T19829] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2992.006541][T19829] __sctp_connect+0x416/0xa80 [ 2992.011239][T19829] sctp_setsockopt+0x2e29/0x8870 [ 2992.016292][T19829] sock_common_setsockopt+0x5d/0x70 [ 2992.021479][T19829] ? sock_common_recvmsg+0xe0/0xe0 [ 2992.026598][T19829] __sys_setsockopt+0x209/0x2a0 [ 2992.031455][T19829] __x64_sys_setsockopt+0x62/0x70 [ 2992.036489][T19829] do_syscall_64+0x44/0xd0 [ 2992.040976][T19829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2992.046953][T19829] RIP: 0033:0x7f4b20a29ae9 [ 2992.051353][T19829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2992.070973][T19829] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2992.079441][T19829] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2992.087415][T19829] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:53:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 74) [ 2992.095422][T19829] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2992.103389][T19829] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2992.111387][T19829] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2992.119436][T19829] [ 2992.299537][T19752] device gretap0 left promiscuous mode [ 2992.332003][T19752] device erspan0 left promiscuous mode 05:53:00 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003d4000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2992.370444][T19752] device ip_vti0 left promiscuous mode [ 2992.391440][T19752] device ip6_vti0 left promiscuous mode [ 2992.418224][T20040] FAULT_INJECTION: forcing a failure. [ 2992.418224][T20040] name failslab, interval 1, probability 0, space 0, times 0 [ 2992.431000][T20040] CPU: 0 PID: 20040 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2992.440852][T20040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2992.450928][T20040] Call Trace: [ 2992.454239][T20040] [ 2992.457222][T20040] dump_stack_lvl+0xd6/0x122 [ 2992.461830][T20040] dump_stack+0x11/0x1b [ 2992.466098][T20040] should_fail+0x23c/0x250 [ 2992.470520][T20040] ? sctp_add_bind_addr+0x73/0x210 [ 2992.475675][T20040] __should_failslab+0x81/0x90 [ 2992.480452][T20040] should_failslab+0x5/0x20 [ 2992.485000][T20040] kmem_cache_alloc_trace+0x52/0x350 [ 2992.490292][T20040] ? sctp_v4_cmp_addr+0x25/0xb0 [ 2992.495233][T20040] sctp_add_bind_addr+0x73/0x210 [ 2992.500178][T20040] sctp_copy_local_addr_list+0x1ab/0x230 [ 2992.505819][T20040] sctp_copy_one_addr+0x7d/0x3f0 [ 2992.510758][T20040] ? sysvec_apic_timer_interrupt+0x4a/0xb0 05:53:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003da000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2992.516569][T20040] sctp_bind_addr_copy+0x7c/0x280 [ 2992.521601][T20040] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2992.527689][T20040] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2992.533061][T20040] __sctp_connect+0x416/0xa80 [ 2992.537766][T20040] sctp_setsockopt+0x2e29/0x8870 [ 2992.542783][T20040] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2992.548975][T20040] sock_common_setsockopt+0x5d/0x70 [ 2992.554254][T20040] ? sock_common_recvmsg+0xe0/0xe0 [ 2992.559437][T20040] __sys_setsockopt+0x209/0x2a0 [ 2992.564327][T20040] __x64_sys_setsockopt+0x62/0x70 [ 2992.569360][T20040] do_syscall_64+0x44/0xd0 [ 2992.573782][T20040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2992.579681][T20040] RIP: 0033:0x7f4b20a29ae9 [ 2992.584229][T20040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2992.603837][T20040] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2992.612256][T20040] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000000e8000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2992.620361][T20040] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2992.628335][T20040] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2992.636350][T20040] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2992.644375][T20040] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2992.652387][T20040] [ 2992.658630][T19752] device sit0 left promiscuous mode [ 2992.890172][T19752] device ip6tnl0 left promiscuous mode [ 2992.920295][T19752] device ip6gre0 left promiscuous mode [ 2993.130394][T19752] device syz_tun left promiscuous mode [ 2993.162807][T19752] device ip6gretap0 left promiscuous mode [ 2993.192483][T19752] bridge0: port 2(bridge_slave_1) entered disabled state [ 2993.199641][T19752] bridge0: port 1(bridge_slave_0) entered disabled state [ 2993.206800][T19752] device bridge0 left promiscuous mode 05:53:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffff7f}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 75) [ 2993.235915][T19831] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2993.246573][T19831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2993.254088][T19831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x8d4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x74000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:01 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000001ed6e8000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2993.292927][T20564] FAULT_INJECTION: forcing a failure. [ 2993.292927][T20564] name failslab, interval 1, probability 0, space 0, times 0 [ 2993.305952][T20564] CPU: 1 PID: 20564 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2993.315864][T20564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2993.325955][T20564] Call Trace: [ 2993.329944][T20564] [ 2993.332876][T20564] dump_stack_lvl+0xd6/0x122 [ 2993.337529][T20564] dump_stack+0x11/0x1b [ 2993.341693][T20564] should_fail+0x23c/0x250 [ 2993.346173][T20564] ? sctp_add_bind_addr+0x73/0x210 [ 2993.351303][T20564] __should_failslab+0x81/0x90 [ 2993.356125][T20564] should_failslab+0x5/0x20 [ 2993.360611][T20564] kmem_cache_alloc_trace+0x52/0x350 [ 2993.365877][T20564] ? sctp_add_bind_addr+0x60/0x210 [ 2993.370976][T20564] sctp_add_bind_addr+0x73/0x210 [ 2993.375943][T20564] sctp_copy_local_addr_list+0x1ab/0x230 [ 2993.381612][T20564] sctp_copy_one_addr+0x7d/0x3f0 [ 2993.386532][T20564] ? get_random_bytes+0x65/0x110 [ 2993.391491][T20564] sctp_bind_addr_copy+0x7c/0x280 [ 2993.396567][T20564] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2993.402642][T20564] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2993.407956][T20564] __sctp_connect+0x416/0xa80 [ 2993.412613][T20564] sctp_setsockopt+0x2e29/0x8870 [ 2993.417535][T20564] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2993.423691][T20564] ? sock_common_recvmsg+0xe0/0xe0 [ 2993.428789][T20564] sock_common_setsockopt+0x5d/0x70 [ 2993.434046][T20564] ? sock_common_recvmsg+0xe0/0xe0 [ 2993.439211][T20564] __sys_setsockopt+0x209/0x2a0 [ 2993.444058][T20564] __x64_sys_setsockopt+0x62/0x70 [ 2993.449087][T20564] do_syscall_64+0x44/0xd0 [ 2993.453553][T20564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2993.459427][T20564] RIP: 0033:0x7f4b20a29ae9 [ 2993.463875][T20564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2993.483657][T20564] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:53:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 76) [ 2993.492053][T20564] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2993.500055][T20564] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2993.508081][T20564] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2993.516082][T20564] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2993.524226][T20564] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2993.532262][T20564] 05:53:02 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000002f4000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2993.702972][T20671] device Y4`Ҙ entered promiscuous mode [ 2993.715713][T20671] device tunl0 entered promiscuous mode [ 2993.728762][T20671] device gre0 entered promiscuous mode [ 2993.795830][T20671] device gretap0 entered promiscuous mode [ 2993.810403][T20671] device erspan0 entered promiscuous mode [ 2993.824479][T20671] device ip_vti0 entered promiscuous mode [ 2993.844181][T20671] device ip6_vti0 entered promiscuous mode [ 2993.847121][T20677] FAULT_INJECTION: forcing a failure. [ 2993.847121][T20677] name failslab, interval 1, probability 0, space 0, times 0 [ 2993.862172][T20671] device sit0 entered promiscuous mode [ 2993.863205][T20677] CPU: 1 PID: 20677 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2993.878162][T20677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2993.888217][T20677] Call Trace: [ 2993.891489][T20677] [ 2993.894452][T20677] dump_stack_lvl+0xd6/0x122 [ 2993.899125][T20677] dump_stack+0x11/0x1b [ 2993.903271][T20677] should_fail+0x23c/0x250 [ 2993.907689][T20677] ? sctp_add_bind_addr+0x73/0x210 [ 2993.912795][T20677] __should_failslab+0x81/0x90 [ 2993.917580][T20677] should_failslab+0x5/0x20 [ 2993.922084][T20677] kmem_cache_alloc_trace+0x52/0x350 [ 2993.927377][T20677] sctp_add_bind_addr+0x73/0x210 [ 2993.932317][T20677] sctp_copy_local_addr_list+0x1ab/0x230 [ 2993.937973][T20677] sctp_copy_one_addr+0x7d/0x3f0 [ 2993.942948][T20677] sctp_bind_addr_copy+0x7c/0x280 [ 2993.947973][T20677] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2993.951642][T20671] device ip6tnl0 entered promiscuous mode [ 2993.954157][T20677] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2993.954184][T20677] __sctp_connect+0x416/0xa80 [ 2993.969822][T20677] sctp_setsockopt+0x2e29/0x8870 [ 2993.971840][T20671] device ip6gre0 entered promiscuous mode [ 2993.974759][T20677] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2993.974786][T20677] ? sock_common_recvmsg+0xe0/0xe0 [ 2993.991754][T20677] sock_common_setsockopt+0x5d/0x70 [ 2993.997000][T20677] ? sock_common_recvmsg+0xe0/0xe0 [ 2994.002185][T20677] __sys_setsockopt+0x209/0x2a0 [ 2994.007087][T20677] __x64_sys_setsockopt+0x62/0x70 [ 2994.012113][T20677] do_syscall_64+0x44/0xd0 [ 2994.016590][T20677] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2994.022512][T20677] RIP: 0033:0x7f4b20a29ae9 [ 2994.026922][T20677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2994.046652][T20677] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2994.055071][T20677] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2994.063038][T20677] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2994.069353][T20671] device syz_tun entered promiscuous mode [ 2994.072873][T20677] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2994.072890][T20677] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 05:53:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 77) [ 2994.072904][T20677] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2994.072943][T20677] [ 2994.122333][T20671] device ip6gretap0 entered promiscuous mode [ 2994.143981][T20671] bridge0: port 2(bridge_slave_1) entered blocking state [ 2994.151201][T20671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2994.159082][T20671] bridge0: port 1(bridge_slave_0) entered blocking state [ 2994.166263][T20671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2994.174494][T20671] device bridge0 entered promiscuous mode [ 2994.175658][T20775] FAULT_INJECTION: forcing a failure. [ 2994.175658][T20775] name failslab, interval 1, probability 0, space 0, times 0 [ 2994.193268][T20775] CPU: 1 PID: 20775 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2994.194590][T20676] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2994.203155][T20775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2994.214408][T20676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2994.220423][T20775] Call Trace: [ 2994.220430][T20775] [ 2994.220437][T20775] dump_stack_lvl+0xd6/0x122 [ 2994.220461][T20775] dump_stack+0x11/0x1b [ 2994.227901][T20676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2994.230971][T20775] should_fail+0x23c/0x250 [ 2994.254247][T20775] ? sctp_add_bind_addr+0x73/0x210 [ 2994.259363][T20775] __should_failslab+0x81/0x90 [ 2994.264145][T20775] should_failslab+0x5/0x20 [ 2994.268657][T20775] kmem_cache_alloc_trace+0x52/0x350 [ 2994.273981][T20775] sctp_add_bind_addr+0x73/0x210 [ 2994.278925][T20775] sctp_copy_local_addr_list+0x1ab/0x230 [ 2994.284562][T20775] sctp_copy_one_addr+0x7d/0x3f0 [ 2994.289498][T20775] ? get_random_bytes+0x65/0x110 [ 2994.294512][T20775] sctp_bind_addr_copy+0x7c/0x280 [ 2994.299581][T20775] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2994.305733][T20775] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2994.311026][T20775] __sctp_connect+0x416/0xa80 [ 2994.315825][T20775] sctp_setsockopt+0x2e29/0x8870 [ 2994.320870][T20775] sock_common_setsockopt+0x5d/0x70 [ 2994.326072][T20775] ? sock_common_recvmsg+0xe0/0xe0 [ 2994.331254][T20775] __sys_setsockopt+0x209/0x2a0 [ 2994.336116][T20775] __x64_sys_setsockopt+0x62/0x70 [ 2994.341228][T20775] do_syscall_64+0x44/0xd0 [ 2994.345699][T20775] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2994.351590][T20775] RIP: 0033:0x7f4b20a29ae9 [ 2994.356098][T20775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2994.375751][T20775] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2994.384172][T20775] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffff9e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:02 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003f4000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x8e4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7a000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 78) 05:53:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x10}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2994.392179][T20775] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2994.400153][T20775] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2994.408130][T20775] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2994.416107][T20775] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2994.424151][T20775] [ 2994.546639][ T253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:53:03 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003fa000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2994.606770][T20908] FAULT_INJECTION: forcing a failure. [ 2994.606770][T20908] name failslab, interval 1, probability 0, space 0, times 0 [ 2994.619830][T20908] CPU: 1 PID: 20908 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2994.629642][T20908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2994.639702][T20908] Call Trace: [ 2994.642978][T20908] [ 2994.645900][T20908] dump_stack_lvl+0xd6/0x122 [ 2994.650522][T20908] dump_stack+0x11/0x1b [ 2994.654676][T20908] should_fail+0x23c/0x250 [ 2994.659156][T20908] ? sctp_add_bind_addr+0x73/0x210 [ 2994.664258][T20908] __should_failslab+0x81/0x90 [ 2994.669009][T20908] should_failslab+0x5/0x20 [ 2994.673584][T20908] kmem_cache_alloc_trace+0x52/0x350 [ 2994.678854][T20908] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2994.684171][T20908] sctp_add_bind_addr+0x73/0x210 [ 2994.689102][T20908] sctp_copy_local_addr_list+0x1ab/0x230 [ 2994.694719][T20908] sctp_copy_one_addr+0x7d/0x3f0 [ 2994.699654][T20908] ? get_random_bytes+0x65/0x110 [ 2994.704579][T20908] sctp_bind_addr_copy+0x7c/0x280 [ 2994.709585][T20908] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2994.715637][T20908] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2994.721053][T20908] __sctp_connect+0x416/0xa80 [ 2994.725740][T20908] sctp_setsockopt+0x2e29/0x8870 [ 2994.730867][T20908] sock_common_setsockopt+0x5d/0x70 [ 2994.736127][T20908] ? sock_common_recvmsg+0xe0/0xe0 [ 2994.741247][T20908] __sys_setsockopt+0x209/0x2a0 [ 2994.746110][T20908] __x64_sys_setsockopt+0x62/0x70 [ 2994.751169][T20908] do_syscall_64+0x44/0xd0 [ 2994.755647][T20908] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2994.761599][T20908] RIP: 0033:0x7f4b20a29ae9 [ 2994.766039][T20908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2994.785689][T20908] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2994.794092][T20908] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 79) [ 2994.802081][T20908] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2994.810072][T20908] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2994.818040][T20908] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2994.826104][T20908] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2994.834066][T20908] 05:53:03 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003fc000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2995.035240][T21014] FAULT_INJECTION: forcing a failure. [ 2995.035240][T21014] name failslab, interval 1, probability 0, space 0, times 0 [ 2995.048162][T21014] CPU: 0 PID: 21014 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2995.058058][T21014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2995.068113][T21014] Call Trace: [ 2995.071506][T21014] [ 2995.074431][T21014] dump_stack_lvl+0xd6/0x122 [ 2995.079027][T21014] dump_stack+0x11/0x1b [ 2995.083179][T21014] should_fail+0x23c/0x250 [ 2995.087689][T21014] ? sctp_add_bind_addr+0x73/0x210 [ 2995.093050][T21014] __should_failslab+0x81/0x90 [ 2995.097828][T21014] should_failslab+0x5/0x20 [ 2995.102407][T21014] kmem_cache_alloc_trace+0x52/0x350 [ 2995.107703][T21014] sctp_add_bind_addr+0x73/0x210 [ 2995.112648][T21014] sctp_copy_local_addr_list+0x1ab/0x230 [ 2995.118320][T21014] sctp_copy_one_addr+0x7d/0x3f0 [ 2995.123339][T21014] ? get_random_bytes+0x65/0x110 [ 2995.128286][T21014] sctp_bind_addr_copy+0x7c/0x280 05:53:03 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000000000003fd000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2995.133374][T21014] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2995.139449][T21014] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2995.144744][T21014] __sctp_connect+0x416/0xa80 [ 2995.149443][T21014] sctp_setsockopt+0x2e29/0x8870 [ 2995.154390][T21014] sock_common_setsockopt+0x5d/0x70 [ 2995.159656][T21014] ? sock_common_recvmsg+0xe0/0xe0 [ 2995.164840][T21014] __sys_setsockopt+0x209/0x2a0 [ 2995.169720][T21014] __x64_sys_setsockopt+0x62/0x70 [ 2995.174758][T21014] do_syscall_64+0x44/0xd0 [ 2995.179177][T21014] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2995.185072][T21014] RIP: 0033:0x7f4b20a29ae9 [ 2995.189609][T21014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2995.209268][T21014] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2995.217796][T21014] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2995.225771][T21014] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:53:03 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) [ 2995.233743][T21014] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2995.241777][T21014] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2995.249754][T21014] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2995.257764][T21014] 05:53:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 80) [ 2995.391184][T21378] FAULT_INJECTION: forcing a failure. [ 2995.391184][T21378] name failslab, interval 1, probability 0, space 0, times 0 [ 2995.404019][T21378] CPU: 1 PID: 21378 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2995.413830][T21378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2995.423932][T21378] Call Trace: [ 2995.427209][T21378] [ 2995.430135][T21378] dump_stack_lvl+0xd6/0x122 [ 2995.434752][T21378] dump_stack+0x11/0x1b [ 2995.438910][T21378] should_fail+0x23c/0x250 [ 2995.443407][T21378] ? sctp_add_bind_addr+0x73/0x210 [ 2995.448517][T21378] __should_failslab+0x81/0x90 [ 2995.453290][T21378] should_failslab+0x5/0x20 [ 2995.457943][T21378] kmem_cache_alloc_trace+0x52/0x350 [ 2995.463280][T21378] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2995.468481][T21378] sctp_add_bind_addr+0x73/0x210 [ 2995.473423][T21378] sctp_copy_local_addr_list+0x1ab/0x230 [ 2995.479054][T21378] sctp_copy_one_addr+0x7d/0x3f0 [ 2995.484027][T21378] sctp_bind_addr_copy+0x7c/0x280 [ 2995.489108][T21378] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2995.495166][T21378] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2995.500452][T21378] __sctp_connect+0x416/0xa80 [ 2995.505179][T21378] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2995.511377][T21378] sctp_setsockopt+0x2e29/0x8870 [ 2995.516303][T21378] sock_common_setsockopt+0x5d/0x70 [ 2995.521550][T21378] ? sock_common_recvmsg+0xe0/0xe0 [ 2995.526650][T21378] __sys_setsockopt+0x209/0x2a0 [ 2995.531502][T21378] __x64_sys_setsockopt+0x62/0x70 [ 2995.536546][T21378] do_syscall_64+0x44/0xd0 [ 2995.541013][T21378] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2995.546959][T21378] RIP: 0033:0x7f4b20a29ae9 [ 2995.551496][T21378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2995.571083][T21378] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2995.579478][T21378] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2995.587510][T21378] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2995.595476][T21378] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2995.603432][T21378] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2995.611420][T21378] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2995.619376][T21378] [ 2996.169687][T20899] bridge0: port 2(bridge_slave_1) entered disabled state [ 2996.176790][T20899] bridge0: port 1(bridge_slave_0) entered disabled state [ 2996.207277][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:53:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffc3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:04 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2996.217816][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2996.225407][T20902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x908, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x21}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 81) 05:53:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x81000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:04 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2996.339732][T21743] FAULT_INJECTION: forcing a failure. [ 2996.339732][T21743] name failslab, interval 1, probability 0, space 0, times 0 [ 2996.352440][T21743] CPU: 0 PID: 21743 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2996.362418][T21743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2996.372468][T21743] Call Trace: [ 2996.375752][T21743] [ 2996.378683][T21743] dump_stack_lvl+0xd6/0x122 [ 2996.383272][T21743] dump_stack+0x11/0x1b [ 2996.387522][T21743] should_fail+0x23c/0x250 [ 2996.391948][T21743] ? sctp_add_bind_addr+0x73/0x210 [ 2996.397063][T21743] __should_failslab+0x81/0x90 [ 2996.401832][T21743] should_failslab+0x5/0x20 [ 2996.406377][T21743] kmem_cache_alloc_trace+0x52/0x350 [ 2996.411663][T21743] ? sctp_v4_cmp_addr+0x6f/0xb0 [ 2996.416584][T21743] sctp_add_bind_addr+0x73/0x210 [ 2996.421528][T21743] sctp_copy_local_addr_list+0x1ab/0x230 [ 2996.427194][T21743] sctp_copy_one_addr+0x7d/0x3f0 [ 2996.432118][T21743] sctp_bind_addr_copy+0x7c/0x280 [ 2996.437173][T21743] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2996.443356][T21743] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2996.448707][T21743] __sctp_connect+0x416/0xa80 [ 2996.453379][T21743] sctp_setsockopt+0x2e29/0x8870 [ 2996.458320][T21743] sock_common_setsockopt+0x5d/0x70 [ 2996.463564][T21743] ? sock_common_recvmsg+0xe0/0xe0 [ 2996.468683][T21743] __sys_setsockopt+0x209/0x2a0 [ 2996.473538][T21743] __x64_sys_setsockopt+0x62/0x70 [ 2996.478564][T21743] do_syscall_64+0x44/0xd0 [ 2996.482988][T21743] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2996.488902][T21743] RIP: 0033:0x7f4b20a29ae9 [ 2996.493311][T21743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2996.512942][T21743] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2996.521361][T21743] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2996.529327][T21743] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2996.537295][T21743] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2996.540190][T21749] bridge0: port 2(bridge_slave_1) entered blocking state [ 2996.545257][T21743] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2996.552294][T21749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2996.560220][T21743] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2996.560239][T21743] [ 2996.578584][T21749] bridge0: port 1(bridge_slave_0) entered blocking state 05:53:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 82) 05:53:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x29}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x88470000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2996.585613][T21749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2996.608290][T21850] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2996.618999][T21850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2996.626495][T21850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x978, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffea}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2996.871415][T22064] FAULT_INJECTION: forcing a failure. [ 2996.871415][T22064] name failslab, interval 1, probability 0, space 0, times 0 [ 2996.884369][T22064] CPU: 0 PID: 22064 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2996.894177][T22064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2996.904263][T22064] Call Trace: [ 2996.907549][T22064] [ 2996.910479][T22064] dump_stack_lvl+0xd6/0x122 [ 2996.915072][T22064] dump_stack+0x11/0x1b 05:53:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x88480000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x60}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2996.919241][T22064] should_fail+0x23c/0x250 [ 2996.923819][T22064] ? sctp_add_bind_addr+0x73/0x210 [ 2996.928932][T22064] __should_failslab+0x81/0x90 [ 2996.933718][T22064] should_failslab+0x5/0x20 [ 2996.938226][T22064] kmem_cache_alloc_trace+0x52/0x350 [ 2996.943510][T22064] ? sctp_bind_addr_state+0x72/0x100 [ 2996.948825][T22064] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2996.954050][T22064] sctp_add_bind_addr+0x73/0x210 [ 2996.958978][T22064] sctp_copy_local_addr_list+0x1ab/0x230 [ 2996.964696][T22064] sctp_copy_one_addr+0x7d/0x3f0 [ 2996.969643][T22064] ? get_random_bytes+0x65/0x110 [ 2996.974586][T22064] sctp_bind_addr_copy+0x7c/0x280 [ 2996.979620][T22064] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2996.985703][T22064] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2996.991075][T22064] __sctp_connect+0x416/0xa80 [ 2996.995847][T22064] sctp_setsockopt+0x2e29/0x8870 [ 2997.000859][T22064] sock_common_setsockopt+0x5d/0x70 [ 2997.006101][T22064] ? sock_common_recvmsg+0xe0/0xe0 [ 2997.011227][T22064] __sys_setsockopt+0x209/0x2a0 [ 2997.016084][T22064] __x64_sys_setsockopt+0x62/0x70 05:53:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2997.021163][T22064] do_syscall_64+0x44/0xd0 [ 2997.025587][T22064] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2997.031526][T22064] RIP: 0033:0x7f4b20a29ae9 [ 2997.036024][T22064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2997.055724][T22064] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2997.064231][T22064] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 83) [ 2997.072221][T22064] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2997.080200][T22064] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2997.088174][T22064] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2997.096152][T22064] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2997.104162][T22064] 05:53:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2997.278942][T22387] FAULT_INJECTION: forcing a failure. [ 2997.278942][T22387] name failslab, interval 1, probability 0, space 0, times 0 [ 2997.291717][T22387] CPU: 0 PID: 22387 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2997.301604][T22387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2997.311665][T22387] Call Trace: [ 2997.314947][T22387] [ 2997.317925][T22387] dump_stack_lvl+0xd6/0x122 [ 2997.322516][T22387] dump_stack+0x11/0x1b [ 2997.326672][T22387] should_fail+0x23c/0x250 [ 2997.331159][T22387] ? sctp_add_bind_addr+0x73/0x210 [ 2997.336272][T22387] __should_failslab+0x81/0x90 [ 2997.341062][T22387] should_failslab+0x5/0x20 [ 2997.345599][T22387] kmem_cache_alloc_trace+0x52/0x350 [ 2997.350892][T22387] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2997.356100][T22387] sctp_add_bind_addr+0x73/0x210 [ 2997.361189][T22387] sctp_copy_local_addr_list+0x1ab/0x230 [ 2997.366833][T22387] sctp_copy_one_addr+0x7d/0x3f0 [ 2997.371831][T22387] ? get_random_bytes+0x65/0x110 [ 2997.376849][T22387] sctp_bind_addr_copy+0x7c/0x280 [ 2997.381872][T22387] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2997.387950][T22387] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2997.393245][T22387] __sctp_connect+0x416/0xa80 [ 2997.398028][T22387] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2997.404192][T22387] ? sctp_setsockopt+0xf8d/0x8870 [ 2997.409305][T22387] sctp_setsockopt+0x2e29/0x8870 [ 2997.414317][T22387] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2997.420572][T22387] ? sock_common_recvmsg+0xe0/0xe0 05:53:05 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2997.425694][T22387] sock_common_setsockopt+0x5d/0x70 [ 2997.430912][T22387] ? sock_common_recvmsg+0xe0/0xe0 [ 2997.436154][T22387] __sys_setsockopt+0x209/0x2a0 [ 2997.441015][T22387] __x64_sys_setsockopt+0x62/0x70 [ 2997.446129][T22387] do_syscall_64+0x44/0xd0 [ 2997.450592][T22387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2997.456568][T22387] RIP: 0033:0x7f4b20a29ae9 [ 2997.461024][T22387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2997.480857][T22387] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2997.489376][T22387] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2997.497348][T22387] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2997.505322][T22387] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2997.513297][T22387] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2997.521269][T22387] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:53:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 84) [ 2997.529246][T22387] [ 2997.688526][T22706] FAULT_INJECTION: forcing a failure. [ 2997.688526][T22706] name failslab, interval 1, probability 0, space 0, times 0 [ 2997.701330][T22706] CPU: 0 PID: 22706 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2997.711181][T22706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2997.721268][T22706] Call Trace: [ 2997.724545][T22706] [ 2997.727478][T22706] dump_stack_lvl+0xd6/0x122 [ 2997.732090][T22706] dump_stack+0x11/0x1b [ 2997.736295][T22706] should_fail+0x23c/0x250 [ 2997.740751][T22706] ? sctp_add_bind_addr+0x73/0x210 [ 2997.745869][T22706] __should_failslab+0x81/0x90 [ 2997.750695][T22706] should_failslab+0x5/0x20 [ 2997.755282][T22706] kmem_cache_alloc_trace+0x52/0x350 [ 2997.760601][T22706] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 2997.765809][T22706] sctp_add_bind_addr+0x73/0x210 [ 2997.770894][T22706] sctp_copy_local_addr_list+0x1ab/0x230 [ 2997.776544][T22706] sctp_copy_one_addr+0x7d/0x3f0 [ 2997.781484][T22706] sctp_bind_addr_copy+0x7c/0x280 [ 2997.786513][T22706] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2997.792590][T22706] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2997.797904][T22706] __sctp_connect+0x416/0xa80 [ 2997.802585][T22706] sctp_setsockopt+0x2e29/0x8870 [ 2997.807523][T22706] sock_common_setsockopt+0x5d/0x70 [ 2997.812828][T22706] ? sock_common_recvmsg+0xe0/0xe0 [ 2997.817939][T22706] __sys_setsockopt+0x209/0x2a0 [ 2997.822903][T22706] __x64_sys_setsockopt+0x62/0x70 [ 2997.827936][T22706] do_syscall_64+0x44/0xd0 [ 2997.832533][T22706] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2997.838440][T22706] RIP: 0033:0x7f4b20a29ae9 [ 2997.842853][T22706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2997.862464][T22706] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2997.870900][T22706] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2997.878880][T22706] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 05:53:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2997.886939][T22706] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2997.894918][T22706] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2997.902938][T22706] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2997.910916][T22706] [ 2998.213179][T22068] bridge0: port 2(bridge_slave_1) entered disabled state [ 2998.220297][T22068] bridge0: port 1(bridge_slave_0) entered disabled state [ 2998.240136][T22069] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2998.250761][T22069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2998.258260][T22069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xb50, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 85) 05:53:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xffffffef}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:06 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2998.369112][T23079] FAULT_INJECTION: forcing a failure. [ 2998.369112][T23079] name failslab, interval 1, probability 0, space 0, times 0 [ 2998.381866][T23079] CPU: 1 PID: 23079 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2998.391680][T23079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2998.401808][T23079] Call Trace: [ 2998.405069][T23079] [ 2998.408005][T23079] dump_stack_lvl+0xd6/0x122 [ 2998.412593][T23079] dump_stack+0x11/0x1b [ 2998.416729][T23079] should_fail+0x23c/0x250 [ 2998.421182][T23079] ? sctp_add_bind_addr+0x73/0x210 [ 2998.426369][T23079] __should_failslab+0x81/0x90 [ 2998.431171][T23079] should_failslab+0x5/0x20 [ 2998.435717][T23079] kmem_cache_alloc_trace+0x52/0x350 [ 2998.441012][T23079] ? sctp_v4_cmp_addr+0x25/0xb0 [ 2998.445876][T23079] sctp_add_bind_addr+0x73/0x210 [ 2998.450847][T23079] sctp_copy_local_addr_list+0x1ab/0x230 [ 2998.456516][T23079] sctp_copy_one_addr+0x7d/0x3f0 [ 2998.461603][T23079] ? get_random_bytes+0x65/0x110 [ 2998.466675][T23079] sctp_bind_addr_copy+0x7c/0x280 [ 2998.471740][T23079] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2998.477872][T23079] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2998.483180][T23079] __sctp_connect+0x416/0xa80 [ 2998.488149][T23079] sctp_setsockopt+0x2e29/0x8870 [ 2998.493090][T23079] sock_common_setsockopt+0x5d/0x70 [ 2998.498296][T23079] ? sock_common_recvmsg+0xe0/0xe0 [ 2998.503397][T23079] __sys_setsockopt+0x209/0x2a0 [ 2998.508292][T23079] __x64_sys_setsockopt+0x62/0x70 [ 2998.513307][T23079] do_syscall_64+0x44/0xd0 [ 2998.517722][T23079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2998.523800][T23079] RIP: 0033:0x7f4b20a29ae9 [ 2998.528226][T23079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2998.547973][T23079] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2998.556372][T23079] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 86) [ 2998.564360][T23079] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2998.572317][T23079] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2998.580279][T23079] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2998.588257][T23079] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2998.596231][T23079] [ 2998.805947][T23125] bridge0: port 2(bridge_slave_1) entered blocking state [ 2998.813158][T23125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2998.820878][T23125] bridge0: port 1(bridge_slave_0) entered blocking state [ 2998.828127][T23125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2998.841857][T23126] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2998.852272][T23126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2998.859806][T23126] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2998.894491][T23129] device Y4`Ҙ left promiscuous mode [ 2998.900799][T23129] device tunl0 left promiscuous mode 05:53:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfffffff0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:07 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2998.906789][T23129] device gre0 left promiscuous mode [ 2998.912613][T23129] device gretap0 left promiscuous mode [ 2998.918582][T23129] device erspan0 left promiscuous mode [ 2998.924675][T23129] device ip_vti0 left promiscuous mode [ 2998.930801][T23129] device ip6_vti0 left promiscuous mode [ 2998.936971][T23129] device sit0 left promiscuous mode [ 2998.942776][T23129] device ip6tnl0 left promiscuous mode [ 2998.948855][T23129] device ip6gre0 left promiscuous mode 05:53:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xb58, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2998.954809][T23129] device syz_tun left promiscuous mode [ 2998.960784][T23129] device ip6gretap0 left promiscuous mode [ 2998.966971][T23129] device bridge0 left promiscuous mode [ 2998.990842][T23349] FAULT_INJECTION: forcing a failure. [ 2998.990842][T23349] name failslab, interval 1, probability 0, space 0, times 0 05:53:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x99d704ab}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x500}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2999.003893][T23349] CPU: 0 PID: 23349 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2999.013708][T23349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2999.023773][T23349] Call Trace: [ 2999.027086][T23349] [ 2999.030004][T23349] dump_stack_lvl+0xd6/0x122 [ 2999.034621][T23349] dump_stack+0x11/0x1b [ 2999.038868][T23349] should_fail+0x23c/0x250 [ 2999.043346][T23349] ? sctp_add_bind_addr+0x73/0x210 [ 2999.048501][T23349] __should_failslab+0x81/0x90 [ 2999.053268][T23349] should_failslab+0x5/0x20 [ 2999.057834][T23349] kmem_cache_alloc_trace+0x52/0x350 [ 2999.063104][T23349] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2999.068293][T23349] sctp_add_bind_addr+0x73/0x210 [ 2999.073236][T23349] sctp_copy_local_addr_list+0x1ab/0x230 [ 2999.078878][T23349] sctp_copy_one_addr+0x7d/0x3f0 [ 2999.083830][T23349] ? get_random_bytes+0x65/0x110 [ 2999.088893][T23349] sctp_bind_addr_copy+0x7c/0x280 [ 2999.094001][T23349] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2999.100079][T23349] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2999.105457][T23349] __sctp_connect+0x416/0xa80 [ 2999.110139][T23349] sctp_setsockopt+0x2e29/0x8870 [ 2999.115185][T23349] sock_common_setsockopt+0x5d/0x70 [ 2999.120398][T23349] ? sock_common_recvmsg+0xe0/0xe0 [ 2999.125497][T23349] __sys_setsockopt+0x209/0x2a0 [ 2999.130400][T23349] __x64_sys_setsockopt+0x62/0x70 [ 2999.135417][T23349] do_syscall_64+0x44/0xd0 [ 2999.139852][T23349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2999.145764][T23349] RIP: 0033:0x7f4b20a29ae9 [ 2999.150180][T23349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2999.169939][T23349] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2999.178447][T23349] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2999.186519][T23349] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2999.194504][T23349] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 05:53:07 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000d000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 87) [ 2999.202487][T23349] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2999.210481][T23349] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2999.218485][T23349] [ 2999.380219][T23660] FAULT_INJECTION: forcing a failure. [ 2999.380219][T23660] name failslab, interval 1, probability 0, space 0, times 0 [ 2999.392983][T23660] CPU: 0 PID: 23660 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2999.402792][T23660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2999.412858][T23660] Call Trace: [ 2999.416140][T23660] [ 2999.419066][T23660] dump_stack_lvl+0xd6/0x122 [ 2999.423715][T23660] dump_stack+0x11/0x1b [ 2999.427872][T23660] should_fail+0x23c/0x250 [ 2999.432318][T23660] ? sctp_add_bind_addr+0x73/0x210 [ 2999.437507][T23660] __should_failslab+0x81/0x90 [ 2999.442349][T23660] should_failslab+0x5/0x20 [ 2999.446877][T23660] kmem_cache_alloc_trace+0x52/0x350 [ 2999.452170][T23660] ? sctp_bind_addr_state+0x87/0x100 [ 2999.457507][T23660] ? sctp_bind_addr_state+0x59/0x100 [ 2999.462800][T23660] sctp_add_bind_addr+0x73/0x210 [ 2999.467745][T23660] sctp_copy_local_addr_list+0x1ab/0x230 [ 2999.473429][T23660] sctp_copy_one_addr+0x7d/0x3f0 05:53:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 2999.478439][T23660] ? get_random_bytes+0x65/0x110 [ 2999.483465][T23660] sctp_bind_addr_copy+0x7c/0x280 [ 2999.488505][T23660] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2999.494580][T23660] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2999.499919][T23660] __sctp_connect+0x416/0xa80 [ 2999.504672][T23660] sctp_setsockopt+0x2e29/0x8870 [ 2999.509651][T23660] sock_common_setsockopt+0x5d/0x70 [ 2999.514903][T23660] ? sock_common_recvmsg+0xe0/0xe0 [ 2999.520057][T23660] __sys_setsockopt+0x209/0x2a0 [ 2999.524915][T23660] __x64_sys_setsockopt+0x62/0x70 [ 2999.529951][T23660] do_syscall_64+0x44/0xd0 [ 2999.534418][T23660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2999.540321][T23660] RIP: 0033:0x7f4b20a29ae9 [ 2999.544761][T23660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2999.564376][T23660] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2999.572838][T23660] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 88) [ 2999.580810][T23660] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2999.588787][T23660] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2999.596768][T23660] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 2999.604769][T23660] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 2999.612776][T23660] [ 2999.771249][T23771] FAULT_INJECTION: forcing a failure. [ 2999.771249][T23771] name failslab, interval 1, probability 0, space 0, times 0 [ 2999.784094][T23771] CPU: 0 PID: 23771 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 2999.793912][T23771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2999.804002][T23771] Call Trace: [ 2999.807288][T23771] [ 2999.810217][T23771] dump_stack_lvl+0xd6/0x122 [ 2999.814824][T23771] dump_stack+0x11/0x1b [ 2999.818980][T23771] should_fail+0x23c/0x250 [ 2999.823466][T23771] ? sctp_add_bind_addr+0x73/0x210 [ 2999.828579][T23771] __should_failslab+0x81/0x90 [ 2999.833367][T23771] should_failslab+0x5/0x20 [ 2999.838036][T23771] kmem_cache_alloc_trace+0x52/0x350 [ 2999.843328][T23771] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 2999.848573][T23771] sctp_add_bind_addr+0x73/0x210 [ 2999.853585][T23771] sctp_copy_local_addr_list+0x1ab/0x230 [ 2999.859269][T23771] sctp_copy_one_addr+0x7d/0x3f0 [ 2999.864216][T23771] ? get_random_bytes+0x65/0x110 [ 2999.869345][T23771] sctp_bind_addr_copy+0x7c/0x280 [ 2999.874379][T23771] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 2999.880540][T23771] sctp_connect_new_asoc+0x1cb/0x3a0 [ 2999.885841][T23771] __sctp_connect+0x416/0xa80 [ 2999.890554][T23771] sctp_setsockopt+0x2e29/0x8870 [ 2999.895494][T23771] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2999.901657][T23771] ? sock_common_recvmsg+0xe0/0xe0 [ 2999.906902][T23771] sock_common_setsockopt+0x5d/0x70 [ 2999.912109][T23771] ? sock_common_recvmsg+0xe0/0xe0 [ 2999.917225][T23771] __sys_setsockopt+0x209/0x2a0 [ 2999.922122][T23771] __x64_sys_setsockopt+0x62/0x70 [ 2999.927154][T23771] do_syscall_64+0x44/0xd0 [ 2999.931573][T23771] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2999.937475][T23771] RIP: 0033:0x7f4b20a29ae9 [ 2999.941984][T23771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2999.961651][T23771] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:53:08 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 89) [ 2999.970074][T23771] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 2999.978067][T23771] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 2999.986136][T23771] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 2999.994115][T23771] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3000.002094][T23771] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3000.010166][T23771] [ 3000.152556][T24128] FAULT_INJECTION: forcing a failure. [ 3000.152556][T24128] name failslab, interval 1, probability 0, space 0, times 0 [ 3000.165551][T24128] CPU: 1 PID: 24128 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3000.175538][T24128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3000.185694][T24128] Call Trace: [ 3000.188977][T24128] [ 3000.191916][T24128] dump_stack_lvl+0xd6/0x122 [ 3000.196513][T24128] dump_stack+0x11/0x1b [ 3000.200733][T24128] should_fail+0x23c/0x250 [ 3000.205217][T24128] ? sctp_add_bind_addr+0x73/0x210 [ 3000.210334][T24128] __should_failslab+0x81/0x90 [ 3000.215154][T24128] should_failslab+0x5/0x20 [ 3000.219697][T24128] kmem_cache_alloc_trace+0x52/0x350 [ 3000.224995][T24128] ? sctp_bind_addr_state+0x87/0x100 [ 3000.230411][T24128] sctp_add_bind_addr+0x73/0x210 [ 3000.235428][T24128] sctp_copy_local_addr_list+0x1ab/0x230 [ 3000.241071][T24128] sctp_copy_one_addr+0x7d/0x3f0 [ 3000.246076][T24128] ? get_random_bytes+0x65/0x110 [ 3000.251048][T24128] sctp_bind_addr_copy+0x7c/0x280 [ 3000.256095][T24128] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3000.262204][T24128] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3000.267532][T24128] __sctp_connect+0x416/0xa80 [ 3000.272219][T24128] sctp_setsockopt+0x2e29/0x8870 [ 3000.277183][T24128] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3000.283372][T24128] ? sock_common_recvmsg+0xe0/0xe0 [ 3000.288488][T24128] sock_common_setsockopt+0x5d/0x70 [ 3000.293712][T24128] ? sock_common_recvmsg+0xe0/0xe0 [ 3000.298826][T24128] __sys_setsockopt+0x209/0x2a0 [ 3000.303751][T24128] __x64_sys_setsockopt+0x62/0x70 [ 3000.308792][T24128] do_syscall_64+0x44/0xd0 [ 3000.313215][T24128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3000.319114][T24128] RIP: 0033:0x7f4b20a29ae9 [ 3000.323538][T24128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3000.343225][T24128] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3000.351717][T24128] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3000.359685][T24128] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3000.367800][T24128] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3000.375963][T24128] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3000.383932][T24128] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3000.391904][T24128] [ 3000.456088][T23444] bridge0: port 2(bridge_slave_1) entered disabled state [ 3000.463235][T23444] bridge0: port 1(bridge_slave_0) entered disabled state [ 3000.488122][T23449] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3000.498622][T23449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0xfffffffe}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000012000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3000.506105][T23449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3000.544275][T23976] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:53:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xb68, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 90) 05:53:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5c3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9effffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3000.555153][T23976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3000.562707][T23976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3000.651949][T24296] FAULT_INJECTION: forcing a failure. [ 3000.651949][T24296] name failslab, interval 1, probability 0, space 0, times 0 [ 3000.665077][T24296] CPU: 0 PID: 24296 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3000.674934][T24296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3000.685035][T24296] Call Trace: [ 3000.688315][T24296] [ 3000.691242][T24296] dump_stack_lvl+0xd6/0x122 [ 3000.695854][T24296] dump_stack+0x11/0x1b [ 3000.700018][T24296] should_fail+0x23c/0x250 [ 3000.704449][T24296] ? sctp_add_bind_addr+0x73/0x210 [ 3000.709684][T24296] __should_failslab+0x81/0x90 [ 3000.714467][T24296] should_failslab+0x5/0x20 [ 3000.718984][T24296] kmem_cache_alloc_trace+0x52/0x350 [ 3000.724272][T24296] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 3000.729478][T24296] sctp_add_bind_addr+0x73/0x210 [ 3000.734589][T24296] sctp_copy_local_addr_list+0x1ab/0x230 [ 3000.740291][T24296] sctp_copy_one_addr+0x7d/0x3f0 [ 3000.745239][T24296] ? get_random_bytes+0x65/0x110 05:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3000.750223][T24296] sctp_bind_addr_copy+0x7c/0x280 [ 3000.755316][T24296] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3000.761465][T24296] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3000.766779][T24296] __sctp_connect+0x416/0xa80 [ 3000.771467][T24296] sctp_setsockopt+0x2e29/0x8870 [ 3000.776493][T24296] sock_common_setsockopt+0x5d/0x70 [ 3000.781701][T24296] ? sock_common_recvmsg+0xe0/0xe0 [ 3000.786834][T24296] __sys_setsockopt+0x209/0x2a0 [ 3000.791696][T24296] __x64_sys_setsockopt+0x62/0x70 [ 3000.796728][T24296] do_syscall_64+0x44/0xd0 [ 3000.801216][T24296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3000.807158][T24296] RIP: 0033:0x7f4b20a29ae9 [ 3000.811568][T24296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3000.813261][T24441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3000.831180][T24296] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:53:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9f030000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 91) 05:53:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x600}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3000.831205][T24296] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3000.831217][T24296] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3000.831228][T24296] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3000.831257][T24296] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3000.831268][T24296] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3000.831283][T24296] [ 3000.893683][T24441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:53:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xb8c, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3000.901187][T24441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3001.152485][T24749] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3001.163351][T24749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3001.170891][T24749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3001.184025][T24725] FAULT_INJECTION: forcing a failure. [ 3001.184025][T24725] name failslab, interval 1, probability 0, space 0, times 0 05:53:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xab04d799}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000029000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x700}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3001.196899][T24725] CPU: 1 PID: 24725 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3001.206732][T24725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3001.216893][T24725] Call Trace: [ 3001.220180][T24725] [ 3001.223111][T24725] dump_stack_lvl+0xd6/0x122 [ 3001.227714][T24725] dump_stack+0x11/0x1b [ 3001.232008][T24725] should_fail+0x23c/0x250 [ 3001.236434][T24725] ? sctp_add_bind_addr+0x73/0x210 [ 3001.241551][T24725] __should_failslab+0x81/0x90 [ 3001.246465][T24725] should_failslab+0x5/0x20 05:53:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbdc, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3001.250980][T24725] kmem_cache_alloc_trace+0x52/0x350 [ 3001.256357][T24725] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 3001.261583][T24725] sctp_add_bind_addr+0x73/0x210 [ 3001.266519][T24725] sctp_copy_local_addr_list+0x1ab/0x230 [ 3001.272135][T24725] sctp_copy_one_addr+0x7d/0x3f0 [ 3001.277070][T24725] ? get_random_bytes+0x65/0x110 [ 3001.282007][T24725] sctp_bind_addr_copy+0x7c/0x280 [ 3001.287016][T24725] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3001.293088][T24725] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3001.298521][T24725] __sctp_connect+0x416/0xa80 [ 3001.303343][T24725] sctp_setsockopt+0x2e29/0x8870 [ 3001.308340][T24725] sock_common_setsockopt+0x5d/0x70 [ 3001.313522][T24725] ? sock_common_recvmsg+0xe0/0xe0 [ 3001.318633][T24725] __sys_setsockopt+0x209/0x2a0 [ 3001.323566][T24725] __x64_sys_setsockopt+0x62/0x70 [ 3001.328768][T24725] do_syscall_64+0x44/0xd0 [ 3001.333185][T24725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3001.339071][T24725] RIP: 0033:0x7f4b20a29ae9 [ 3001.343466][T24725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3001.363057][T24725] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3001.371474][T24725] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3001.379432][T24725] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3001.387463][T24725] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3001.395495][T24725] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 05:53:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 92) [ 3001.403564][T24725] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3001.411539][T24725] 05:53:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc3050000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3001.685792][T25041] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3001.696178][T25041] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3001.703707][T25041] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3001.721193][T25043] FAULT_INJECTION: forcing a failure. [ 3001.721193][T25043] name failslab, interval 1, probability 0, space 0, times 0 [ 3001.733918][T25043] CPU: 0 PID: 25043 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3001.743759][T25043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3001.753810][T25043] Call Trace: [ 3001.757175][T25043] [ 3001.760107][T25043] dump_stack_lvl+0xd6/0x122 [ 3001.764699][T25043] dump_stack+0x11/0x1b [ 3001.768855][T25043] should_fail+0x23c/0x250 [ 3001.773290][T25043] ? sctp_add_bind_addr+0x73/0x210 [ 3001.778409][T25043] __should_failslab+0x81/0x90 05:53:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000032000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbe0, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3001.783189][T25043] should_failslab+0x5/0x20 [ 3001.787698][T25043] kmem_cache_alloc_trace+0x52/0x350 [ 3001.792992][T25043] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 3001.798244][T25043] sctp_add_bind_addr+0x73/0x210 [ 3001.803227][T25043] sctp_copy_local_addr_list+0x1ab/0x230 [ 3001.808870][T25043] sctp_copy_one_addr+0x7d/0x3f0 [ 3001.813882][T25043] sctp_bind_addr_copy+0x7c/0x280 [ 3001.818899][T25043] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3001.824971][T25043] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3001.830341][T25043] __sctp_connect+0x416/0xa80 [ 3001.835024][T25043] sctp_setsockopt+0x2e29/0x8870 [ 3001.839975][T25043] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3001.846126][T25043] ? sock_common_recvmsg+0xe0/0xe0 [ 3001.851250][T25043] sock_common_setsockopt+0x5d/0x70 [ 3001.856452][T25043] ? sock_common_recvmsg+0xe0/0xe0 [ 3001.861605][T25043] __sys_setsockopt+0x209/0x2a0 [ 3001.866526][T25043] __x64_sys_setsockopt+0x62/0x70 [ 3001.871613][T25043] do_syscall_64+0x44/0xd0 [ 3001.876031][T25043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3001.881936][T25043] RIP: 0033:0x7f4b20a29ae9 05:53:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3001.886351][T25043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3001.905978][T25043] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3001.914395][T25043] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3001.922363][T25043] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3001.930331][T25043] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3001.938367][T25043] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3001.946369][T25043] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3001.954346][T25043] [ 3001.966280][T25370] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3001.976871][T25370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:53:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 93) [ 3001.984392][T25370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc3ffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3002.029750][T25452] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3002.040412][T25452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3002.047994][T25452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbe4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:10 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000058000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3002.141692][T25569] FAULT_INJECTION: forcing a failure. [ 3002.141692][T25569] name failslab, interval 1, probability 0, space 0, times 0 [ 3002.154782][T25569] CPU: 1 PID: 25569 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3002.164658][T25569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3002.174716][T25569] Call Trace: [ 3002.178048][T25569] [ 3002.180999][T25569] dump_stack_lvl+0xd6/0x122 [ 3002.185597][T25569] dump_stack+0x11/0x1b [ 3002.189770][T25569] should_fail+0x23c/0x250 [ 3002.194194][T25569] ? sctp_add_bind_addr+0x73/0x210 [ 3002.199435][T25569] __should_failslab+0x81/0x90 [ 3002.204241][T25569] should_failslab+0x5/0x20 [ 3002.208822][T25569] kmem_cache_alloc_trace+0x52/0x350 [ 3002.214242][T25569] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 3002.219445][T25569] sctp_add_bind_addr+0x73/0x210 [ 3002.224586][T25569] sctp_copy_local_addr_list+0x1ab/0x230 [ 3002.230254][T25569] sctp_copy_one_addr+0x7d/0x3f0 [ 3002.235213][T25569] sctp_bind_addr_copy+0x7c/0x280 05:53:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3002.240238][T25569] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3002.246315][T25569] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3002.251593][T25569] __sctp_connect+0x416/0xa80 [ 3002.256498][T25569] sctp_setsockopt+0x2e29/0x8870 [ 3002.261435][T25569] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3002.267578][T25569] ? sock_common_recvmsg+0xe0/0xe0 [ 3002.272751][T25569] sock_common_setsockopt+0x5d/0x70 [ 3002.277946][T25569] ? sock_common_recvmsg+0xe0/0xe0 [ 3002.283061][T25569] __sys_setsockopt+0x209/0x2a0 [ 3002.287933][T25569] __x64_sys_setsockopt+0x62/0x70 [ 3002.292942][T25569] do_syscall_64+0x44/0xd0 [ 3002.297345][T25569] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3002.303261][T25569] RIP: 0033:0x7f4b20a29ae9 [ 3002.307705][T25569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3002.327468][T25569] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 05:53:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 94) [ 3002.335923][T25569] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3002.343940][T25569] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3002.352012][T25569] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3002.359971][T25569] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3002.367927][T25569] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3002.375894][T25569] 05:53:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xeaffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3002.606818][T25786] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3002.617179][T25786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3002.624731][T25786] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3002.646023][T25791] FAULT_INJECTION: forcing a failure. [ 3002.646023][T25791] name failslab, interval 1, probability 0, space 0, times 0 [ 3002.658809][T25791] CPU: 1 PID: 25791 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3002.668615][T25791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3002.678670][T25791] Call Trace: [ 3002.681952][T25791] [ 3002.684882][T25791] dump_stack_lvl+0xd6/0x122 [ 3002.689506][T25791] dump_stack+0x11/0x1b [ 3002.693662][T25791] should_fail+0x23c/0x250 [ 3002.698091][T25791] ? sctp_add_bind_addr+0x73/0x210 [ 3002.703290][T25791] __should_failslab+0x81/0x90 [ 3002.708139][T25791] should_failslab+0x5/0x20 [ 3002.712657][T25791] kmem_cache_alloc_trace+0x52/0x350 [ 3002.718077][T25791] ? __sctp_v6_cmp_addr+0x21a/0x2c0 [ 3002.723423][T25791] sctp_add_bind_addr+0x73/0x210 [ 3002.728425][T25791] sctp_copy_local_addr_list+0x1ab/0x230 [ 3002.734259][T25791] sctp_copy_one_addr+0x7d/0x3f0 [ 3002.739265][T25791] ? get_random_bytes+0x65/0x110 [ 3002.744211][T25791] sctp_bind_addr_copy+0x7c/0x280 [ 3002.749299][T25791] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3002.755370][T25791] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3002.760723][T25791] __sctp_connect+0x416/0xa80 [ 3002.765425][T25791] sctp_setsockopt+0x2e29/0x8870 [ 3002.770371][T25791] sock_common_setsockopt+0x5d/0x70 [ 3002.775617][T25791] ? sock_common_recvmsg+0xe0/0xe0 [ 3002.780746][T25791] __sys_setsockopt+0x209/0x2a0 [ 3002.785644][T25791] __x64_sys_setsockopt+0x62/0x70 [ 3002.790734][T25791] do_syscall_64+0x44/0xd0 [ 3002.795154][T25791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3002.801056][T25791] RIP: 0033:0x7f4b20a29ae9 05:53:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbe8, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:11 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000064000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3002.805474][T25791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3002.825087][T25791] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3002.833505][T25791] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3002.841475][T25791] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3002.849449][T25791] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 05:53:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 95) 05:53:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xefffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3002.857440][T25791] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3002.865434][T25791] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3002.873393][T25791] 05:53:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3003.152869][T26109] FAULT_INJECTION: forcing a failure. [ 3003.152869][T26109] name failslab, interval 1, probability 0, space 0, times 0 [ 3003.165793][T26109] CPU: 1 PID: 26109 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3003.174500][T26108] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3003.175754][T26109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3003.175768][T26109] Call Trace: [ 3003.175776][T26109] [ 3003.175783][T26109] dump_stack_lvl+0xd6/0x122 [ 3003.175876][T26109] dump_stack+0x11/0x1b [ 3003.186912][T26108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3003.193045][T26109] should_fail+0x23c/0x250 [ 3003.196591][T26108] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3003.199225][T26109] ? sctp_add_bind_addr+0x73/0x210 [ 3003.231970][T26109] __should_failslab+0x81/0x90 [ 3003.236777][T26109] should_failslab+0x5/0x20 [ 3003.241294][T26109] kmem_cache_alloc_trace+0x52/0x350 [ 3003.246587][T26109] ? sctp_v4_cmp_addr+0x4e/0xb0 05:53:11 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000088000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3003.251450][T26109] sctp_add_bind_addr+0x73/0x210 [ 3003.256400][T26109] sctp_copy_local_addr_list+0x1ab/0x230 [ 3003.262047][T26109] sctp_copy_one_addr+0x7d/0x3f0 [ 3003.267040][T26109] ? get_random_bytes+0x65/0x110 [ 3003.271990][T26109] sctp_bind_addr_copy+0x7c/0x280 [ 3003.277097][T26109] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3003.283157][T26109] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3003.288427][T26109] __sctp_connect+0x416/0xa80 [ 3003.293099][T26109] sctp_setsockopt+0x2e29/0x8870 [ 3003.298129][T26109] sock_common_setsockopt+0x5d/0x70 [ 3003.303312][T26109] ? sock_common_recvmsg+0xe0/0xe0 [ 3003.308419][T26109] __sys_setsockopt+0x209/0x2a0 [ 3003.313259][T26109] __x64_sys_setsockopt+0x62/0x70 [ 3003.318294][T26109] do_syscall_64+0x44/0xd0 [ 3003.322827][T26109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3003.328765][T26109] RIP: 0033:0x7f4b20a29ae9 [ 3003.333179][T26109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3003.352772][T26109] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3003.361222][T26109] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3003.369272][T26109] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3003.377232][T26109] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3003.385353][T26109] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3003.393401][T26109] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:53:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 96) 05:53:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbf4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3003.401385][T26109] 05:53:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000098000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3003.648805][T26430] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3003.659581][T26430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3003.667121][T26430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xfeffffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3003.716615][T26530] FAULT_INJECTION: forcing a failure. [ 3003.716615][T26530] name failslab, interval 1, probability 0, space 0, times 0 [ 3003.729439][T26530] CPU: 0 PID: 26530 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3003.739254][T26530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3003.749491][T26530] Call Trace: [ 3003.752768][T26530] [ 3003.755694][T26530] dump_stack_lvl+0xd6/0x122 [ 3003.760288][T26530] dump_stack+0x11/0x1b 05:53:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbf8, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3003.764447][T26530] should_fail+0x23c/0x250 [ 3003.768883][T26530] ? sctp_add_bind_addr+0x73/0x210 [ 3003.774003][T26530] __should_failslab+0x81/0x90 [ 3003.778854][T26530] should_failslab+0x5/0x20 [ 3003.783377][T26530] kmem_cache_alloc_trace+0x52/0x350 [ 3003.788688][T26530] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 3003.793957][T26530] sctp_add_bind_addr+0x73/0x210 [ 3003.798907][T26530] sctp_copy_local_addr_list+0x1ab/0x230 [ 3003.804618][T26530] sctp_copy_one_addr+0x7d/0x3f0 [ 3003.809565][T26530] ? get_random_bytes+0x65/0x110 [ 3003.814593][T26530] sctp_bind_addr_copy+0x7c/0x280 [ 3003.819634][T26530] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3003.825786][T26530] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3003.831104][T26530] __sctp_connect+0x416/0xa80 [ 3003.835790][T26530] sctp_setsockopt+0x2e29/0x8870 [ 3003.840742][T26530] sock_common_setsockopt+0x5d/0x70 [ 3003.845950][T26530] ? sock_common_recvmsg+0xe0/0xe0 [ 3003.851075][T26530] __sys_setsockopt+0x209/0x2a0 [ 3003.855952][T26530] __x64_sys_setsockopt+0x62/0x70 [ 3003.860982][T26530] do_syscall_64+0x44/0xd0 [ 3003.865467][T26530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3003.871359][T26530] RIP: 0033:0x7f4b20a29ae9 [ 3003.875803][T26530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3003.895514][T26530] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3003.903929][T26530] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3003.911902][T26530] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3003.919902][T26530] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3003.927877][T26530] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3003.935941][T26530] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3003.943928][T26530] [ 3003.947948][T26748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3003.958558][T26748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:53:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xffffa888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 97) 05:53:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3003.966131][T26748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xbfc, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000d4000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3004.183530][T27025] FAULT_INJECTION: forcing a failure. [ 3004.183530][T27025] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.196532][T27025] CPU: 0 PID: 27025 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3004.206414][T27025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3004.216468][T27025] Call Trace: [ 3004.219754][T27025] [ 3004.222681][T27025] dump_stack_lvl+0xd6/0x122 [ 3004.227277][T27025] dump_stack+0x11/0x1b 05:53:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3b4e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xffffff7f}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3004.231460][T27025] should_fail+0x23c/0x250 [ 3004.235932][T27025] ? sctp_add_bind_addr+0x73/0x210 [ 3004.241133][T27025] __should_failslab+0x81/0x90 [ 3004.245901][T27025] should_failslab+0x5/0x20 [ 3004.250417][T27025] kmem_cache_alloc_trace+0x52/0x350 [ 3004.255709][T27025] ? sctp_v4_cmp_addr+0x19/0xb0 [ 3004.260635][T27025] sctp_add_bind_addr+0x73/0x210 [ 3004.265578][T27025] sctp_copy_local_addr_list+0x1ab/0x230 [ 3004.271288][T27025] sctp_copy_one_addr+0x7d/0x3f0 [ 3004.276236][T27025] ? get_random_bytes+0x65/0x110 [ 3004.281227][T27025] sctp_bind_addr_copy+0x7c/0x280 [ 3004.286296][T27025] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3004.286317][T27170] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3004.290184][T27170] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3004.292551][T27025] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3004.299921][T27170] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3004.306995][T27025] __sctp_connect+0x416/0xa80 [ 3004.307025][T27025] sctp_setsockopt+0x2e29/0x8870 [ 3004.329135][T27025] sock_common_setsockopt+0x5d/0x70 05:53:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc18, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3004.334389][T27025] ? sock_common_recvmsg+0xe0/0xe0 [ 3004.339582][T27025] __sys_setsockopt+0x209/0x2a0 [ 3004.344481][T27025] __x64_sys_setsockopt+0x62/0x70 [ 3004.349624][T27025] do_syscall_64+0x44/0xd0 [ 3004.354123][T27025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3004.360044][T27025] RIP: 0033:0x7f4b20a29ae9 [ 3004.364457][T27025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:53:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3004.384093][T27025] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3004.392516][T27025] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3004.400536][T27025] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3004.408686][T27025] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3004.416739][T27025] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3004.424740][T27025] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:53:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 98) [ 3004.432770][T27025] 05:53:12 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000e8000000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xffffff9e}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4788}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3004.553341][T27485] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3004.563749][T27485] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3004.571249][T27485] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc1c, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3004.659233][T27525] FAULT_INJECTION: forcing a failure. [ 3004.659233][T27525] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.672367][T27525] CPU: 1 PID: 27525 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3004.682184][T27525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3004.692240][T27525] Call Trace: [ 3004.695561][T27525] [ 3004.698542][T27525] dump_stack_lvl+0xd6/0x122 [ 3004.703133][T27525] dump_stack+0x11/0x1b [ 3004.707286][T27525] should_fail+0x23c/0x250 [ 3004.711742][T27525] ? sctp_add_bind_addr+0x73/0x210 [ 3004.716854][T27525] __should_failslab+0x81/0x90 [ 3004.721694][T27525] should_failslab+0x5/0x20 [ 3004.726213][T27525] kmem_cache_alloc_trace+0x52/0x350 [ 3004.731562][T27525] ? __sctp_v6_cmp_addr+0x13e/0x2c0 [ 3004.736762][T27525] sctp_add_bind_addr+0x73/0x210 [ 3004.741697][T27525] sctp_copy_local_addr_list+0x1ab/0x230 [ 3004.747367][T27525] sctp_copy_one_addr+0x7d/0x3f0 [ 3004.752333][T27525] ? get_random_bytes+0x65/0x110 05:53:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3004.757272][T27525] sctp_bind_addr_copy+0x7c/0x280 [ 3004.762304][T27525] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3004.768381][T27525] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3004.773669][T27525] __sctp_connect+0x416/0xa80 [ 3004.778366][T27525] sctp_setsockopt+0x2e29/0x8870 [ 3004.783357][T27525] sock_common_setsockopt+0x5d/0x70 [ 3004.788545][T27525] ? sock_common_recvmsg+0xe0/0xe0 [ 3004.793656][T27525] __sys_setsockopt+0x209/0x2a0 [ 3004.798551][T27525] __x64_sys_setsockopt+0x62/0x70 [ 3004.803575][T27525] do_syscall_64+0x44/0xd0 [ 3004.808062][T27525] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3004.813992][T27525] RIP: 0033:0x7f4b20a29ae9 [ 3004.818409][T27525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3004.838012][T27525] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3004.846409][T27525] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 05:53:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 99) 05:53:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000040010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3004.854378][T27525] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3004.862419][T27525] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3004.870482][T27525] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3004.878454][T27525] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 [ 3004.886436][T27525] 05:53:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xffffffc3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc7c, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3005.106925][T27808] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3005.117522][T27808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3005.124991][T27808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:13 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000066010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3005.231260][T27960] FAULT_INJECTION: forcing a failure. [ 3005.231260][T27960] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.244288][T27960] CPU: 0 PID: 27960 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3005.254129][T27960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3005.264224][T27960] Call Trace: [ 3005.267494][T27960] [ 3005.270423][T27960] dump_stack_lvl+0xd6/0x122 [ 3005.275022][T27960] dump_stack+0x11/0x1b 05:53:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xffffffea}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3005.279179][T27960] should_fail+0x23c/0x250 [ 3005.283609][T27960] ? sctp_add_bind_addr+0x73/0x210 [ 3005.288723][T27960] __should_failslab+0x81/0x90 [ 3005.293530][T27960] should_failslab+0x5/0x20 [ 3005.298071][T27960] kmem_cache_alloc_trace+0x52/0x350 [ 3005.303365][T27960] ? __sctp_v6_cmp_addr+0x148/0x2c0 [ 3005.308562][T27960] sctp_add_bind_addr+0x73/0x210 [ 3005.313503][T27960] sctp_copy_local_addr_list+0x1ab/0x230 [ 3005.319127][T27960] sctp_copy_one_addr+0x7d/0x3f0 [ 3005.324099][T27960] ? get_random_bytes+0x65/0x110 [ 3005.329049][T27960] sctp_bind_addr_copy+0x7c/0x280 [ 3005.334078][T27960] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3005.340237][T27960] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3005.345550][T27960] __sctp_connect+0x416/0xa80 [ 3005.350341][T27960] sctp_setsockopt+0x2e29/0x8870 [ 3005.355340][T27960] sock_common_setsockopt+0x5d/0x70 [ 3005.360549][T27960] ? sock_common_recvmsg+0xe0/0xe0 [ 3005.365663][T27960] __sys_setsockopt+0x209/0x2a0 [ 3005.370605][T27960] __x64_sys_setsockopt+0x62/0x70 [ 3005.375674][T27960] do_syscall_64+0x44/0xd0 05:53:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4dc9}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3005.380087][T27960] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3005.385984][T27960] RIP: 0033:0x7f4b20a29ae9 [ 3005.390434][T27960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3005.407519][T28124] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3005.410040][T27960] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3005.410064][T27960] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3005.420466][T28124] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3005.425628][T27960] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3005.433791][T28124] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3005.440865][T27960] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3005.440879][T27960] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000002 [ 3005.472036][T27960] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:53:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc88, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) (fail_nth: 100) [ 3005.480106][T27960] 05:53:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x10}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000006a010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xffffffef}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3005.679653][T28391] FAULT_INJECTION: forcing a failure. [ 3005.679653][T28391] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.686883][T28429] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3005.692394][T28391] CPU: 0 PID: 28391 Comm: syz-executor.5 Tainted: G W 5.15.0-syzkaller #0 [ 3005.702658][T28429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3005.709343][T28391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3005.709355][T28391] Call Trace: [ 3005.709361][T28391] [ 3005.709368][T28391] dump_stack_lvl+0xd6/0x122 [ 3005.709393][T28391] dump_stack+0x11/0x1b [ 3005.709410][T28391] should_fail+0x23c/0x250 [ 3005.716904][T28429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3005.726765][T28391] ? sctp_add_bind_addr+0x73/0x210 [ 3005.758394][T28391] __should_failslab+0x81/0x90 [ 3005.763170][T28391] should_failslab+0x5/0x20 [ 3005.767686][T28391] kmem_cache_alloc_trace+0x52/0x350 [ 3005.772983][T28391] sctp_add_bind_addr+0x73/0x210 05:53:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4e3b}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x21}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc8c, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3005.777923][T28391] sctp_copy_local_addr_list+0x1ab/0x230 [ 3005.783561][T28391] sctp_copy_one_addr+0x7d/0x3f0 [ 3005.788566][T28391] ? get_random_bytes+0x65/0x110 [ 3005.793539][T28391] sctp_bind_addr_copy+0x7c/0x280 [ 3005.798621][T28391] sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 [ 3005.804772][T28391] sctp_connect_new_asoc+0x1cb/0x3a0 [ 3005.810079][T28391] __sctp_connect+0x416/0xa80 [ 3005.814854][T28391] sctp_setsockopt+0x2e29/0x8870 [ 3005.819793][T28391] ? security_socket_setsockopt+0x7f/0x90 [ 3005.825663][T28391] sock_common_setsockopt+0x5d/0x70 [ 3005.830907][T28391] ? sock_common_recvmsg+0xe0/0xe0 [ 3005.836008][T28391] __sys_setsockopt+0x209/0x2a0 [ 3005.840900][T28391] __x64_sys_setsockopt+0x62/0x70 [ 3005.845921][T28391] do_syscall_64+0x44/0xd0 [ 3005.850352][T28391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3005.856230][T28391] RIP: 0033:0x7f4b20a29ae9 [ 3005.860627][T28391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3005.880239][T28391] RSP: 002b:00007f4b1e7a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3005.888654][T28391] RAX: ffffffffffffffda RBX: 00007f4b20b3cf60 RCX: 00007f4b20a29ae9 [ 3005.896629][T28391] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000005 [ 3005.904608][T28391] RBP: 00007f4b1e7a01d0 R08: 000000000000001c R09: 0000000000000000 [ 3005.912595][T28391] R10: 000000002055bfe4 R11: 0000000000000246 R12: 0000000000000003 [ 3005.920598][T28391] R13: 00007fff8b6d41ff R14: 00007f4b1e7a0300 R15: 0000000000022000 05:53:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xfffffff0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:14 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000007a010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3005.928582][T28391] 05:53:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5865}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3006.004068][T28662] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3006.014817][T28662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3006.022408][T28662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x60}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xc98, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3006.059992][T28863] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3006.071050][T28863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3006.078502][T28863] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xfffffffe}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000090010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0xca4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3006.261980][T28961] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3006.272583][T28961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3006.280224][T28961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 05:53:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x4, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:14 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000098010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) [ 3006.458013][T29299] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3006.468744][T29299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3006.476289][T29299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3006.511704][T29301] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 3006.550517][T29340] device Y4`Ҙ left promiscuous mode [ 3006.559998][T29340] device tunl0 left promiscuous mode [ 3006.570749][T29340] device gre0 left promiscuous mode [ 3006.579438][T29340] device gretap0 left promiscuous mode [ 3006.588498][T29340] device erspan0 left promiscuous mode [ 3006.597624][T29340] device ip_vti0 left promiscuous mode [ 3006.607328][T29340] device ip6_vti0 left promiscuous mode [ 3006.616729][T29340] device sit0 left promiscuous mode [ 3006.626198][T29340] device ip6tnl0 left promiscuous mode [ 3006.636286][T29340] device ip6gre0 left promiscuous mode [ 3006.645847][T29340] device syz_tun left promiscuous mode [ 3006.655454][T29340] device ip6gretap0 left promiscuous mode [ 3006.664899][T29340] device bridge0 left promiscuous mode 05:53:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x29, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x4}]}, 0x30}}, 0x0) 05:53:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6558}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x500}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:15 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000ca010000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x10, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x21, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3007.090999][T29621] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 05:53:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x10}]}, 0x30}}, 0x0) 05:53:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:15 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000028020000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5c3}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3007.137353][T29618] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 05:53:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x2, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x29, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8d4}]}, 0x30}}, 0x0) [ 3007.282504][T30038] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3007.314122][T30042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8847}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:15 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000002a020000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x3, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x3e8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x600}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3007.468904][T30456] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8dc}]}, 0x30}}, 0x0) [ 3007.531253][T30461] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8848}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000f4020000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x3f0, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3007.650628][T30676] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3007.663433][T30733] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8ec}]}, 0x30}}, 0x0) [ 3007.708517][T30738] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x700}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x4, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc305}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x3f8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3007.830933][T31098] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x910}]}, 0x30}}, 0x0) [ 3007.882645][T31103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3007.893240][T31104] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3007.940379][ T1403] ================================================================== [ 3007.948454][ T1403] BUG: KCSAN: data-race in __jbd2_journal_drop_transaction / start_this_handle [ 3007.957481][ T1403] [ 3007.959783][ T1403] write to 0xffff8881035d0078 of 8 bytes by task 31102 on cpu 0: [ 3007.967481][ T1403] start_this_handle+0xd37/0x1050 [ 3007.972526][ T1403] jbd2__journal_start+0x1fc/0x3f0 [ 3007.977627][ T1403] __ext4_journal_start_sb+0x159/0x310 [ 3007.983071][ T1403] ext4_dirty_inode+0x58/0xa0 [ 3007.987729][ T1403] __mark_inode_dirty+0x72/0x6c0 [ 3007.992644][ T1403] inode_update_time+0x1b4/0x1d0 [ 3007.997581][ T1403] file_update_time+0x1f3/0x230 [ 3008.002447][ T1403] ext4_page_mkwrite+0x14d/0xf40 [ 3008.007397][ T1403] handle_mm_fault+0xdb8/0x1590 [ 3008.012227][ T1403] do_user_addr_fault+0x609/0xbe0 [ 3008.017228][ T1403] exc_page_fault+0x91/0x290 [ 3008.021796][ T1403] asm_exc_page_fault+0x1e/0x30 [ 3008.026625][ T1403] [ 3008.028982][ T1403] read to 0xffff8881035d0078 of 8 bytes by task 1403 on cpu 1: [ 3008.036496][ T1403] __jbd2_journal_drop_transaction+0x1f0/0x2f0 [ 3008.042636][ T1403] __jbd2_journal_remove_checkpoint+0x2d5/0x3a0 [ 3008.048987][ T1403] jbd2_journal_commit_transaction+0x23f1/0x3460 [ 3008.055303][ T1403] kjournald2+0x263/0x480 [ 3008.059632][ T1403] kthread+0x2c7/0x2e0 [ 3008.063677][ T1403] ret_from_fork+0x1f/0x30 [ 3008.068068][ T1403] [ 3008.070366][ T1403] value changed: 0x0000000000000000 -> 0xffff88810479d600 [ 3008.077446][ T1403] [ 3008.079746][ T1403] Reported by Kernel Concurrency Sanitizer on: [ 3008.085868][ T1403] CPU: 1 PID: 1403 Comm: jbd2/sda1-8 Tainted: G W 5.15.0-syzkaller #0 [ 3008.095299][ T1403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3008.105328][ T1403] ================================================================== 05:53:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x900}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000022030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x5, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc94d}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x408, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x980}]}, 0x30}}, 0x0) 05:53:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x410, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xb4c}]}, 0x30}}, 0x0) 05:53:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x34000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000082030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x418, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xb54}]}, 0x30}}, 0x0) 05:53:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x420, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000008c030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x400300}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xbd5}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xb64}]}, 0x30}}, 0x0) 05:53:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x424, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a6000040010000400100004001000040010000030000000000000000000000009c030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x1000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x8, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xb88}]}, 0x30}}, 0x0) 05:53:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x428, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xbd7}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000c0030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xbe8}]}, 0x30}}, 0x0) 05:53:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x42c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x9, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:17 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000ca030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xbf0}]}, 0x30}}, 0x0) 05:53:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x430, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf00}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000cc030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x434, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xbf8}]}, 0x30}}, 0x0) 05:53:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xa, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x438, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc00}]}, 0x30}}, 0x0) 05:53:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000d4030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xb, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x43c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc08}]}, 0x30}}, 0x0) 05:53:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4788}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000da030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x440, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc10}]}, 0x30}}, 0x0) 05:53:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xc, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4888}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000f4030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc18}]}, 0x30}}, 0x0) 05:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x444, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xd, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5865}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000fa030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc20}]}, 0x30}}, 0x0) 05:53:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x448, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc24}]}, 0x30}}, 0x0) 05:53:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000fc030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x10, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x44c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc28}]}, 0x30}}, 0x0) 05:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x450, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000fd030000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6558}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x11, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xa000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc2c}]}, 0x30}}, 0x0) 05:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x454, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8100}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc30}]}, 0x30}}, 0x0) 05:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x12, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x458, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc34}]}, 0x30}}, 0x0) 05:53:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xf000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x45c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8847}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x13, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc38}]}, 0x30}}, 0x0) 05:53:19 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x10000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x460, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc3c}]}, 0x30}}, 0x0) 05:53:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x8848}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x14, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x464, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x21000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc40}]}, 0x30}}, 0x0) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x468, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xc305}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x29000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc44}]}, 0x30}}, 0x0) 05:53:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x15, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x46c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc48}]}, 0x30}}, 0x0) 05:53:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xd50b}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3b4e0000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000b0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x470, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x16, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc4c}]}, 0x30}}, 0x0) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x474, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0xd70b}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x60000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc50}]}, 0x30}}, 0x0) 05:53:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x17, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x478, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc54}]}, 0x30}}, 0x0) 05:53:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x1000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000d0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x65580000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x47c, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x18, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 3012.355214][ T7161] __nla_validate_parse: 61 callbacks suppressed [ 3012.355231][ T7161] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3012.373031][ T7161] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc58}]}, 0x30}}, 0x0) [ 3012.445951][ T7164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3012.455821][ T7166] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x2000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000000e0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x480, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3012.565607][ T7295] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6e7645e0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc5c}]}, 0x30}}, 0x0) 05:53:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x19, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 3012.631789][ T7591] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3012.754644][ T7603] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x484, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000110000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x3000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x81000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc60}]}, 0x30}}, 0x0) [ 3012.797537][ T7822] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x1e, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x488, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3012.910037][ T8025] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:53:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000120000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc64}]}, 0x30}}, 0x0) 05:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x88470000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x4000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3012.997209][ T8202] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:53:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x21, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x494, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc68}]}, 0x30}}, 0x0) 05:53:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a600004001000040010000400100004001000003000000000000000000000000001d0000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x88480000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x5000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x4a0, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x22, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc6c}]}, 0x30}}, 0x0) 05:53:21 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x5d4, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x6000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc70}]}, 0x30}}, 0x0) 05:53:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x23, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x5dc, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x9effffff}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000000210000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0xa, 0x0, {0x8, 0x0, 0xf0, 0x0, 0x0, 0x7000000}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc74}]}, 0x30}}, 0x0) 05:53:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x24, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 05:53:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x604, 0x4, r2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 05:53:22 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d80100009800000000000000980000009800d95e162d5e9560a60000400100004001000040010000400100000300000000000000000000000003220000000000000000000000000000000000000000000000000000000000000000000200000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e465155455545002017d7ce0000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000040000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600002000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 05:53:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x8, 0x0, 0xf0}, [@IFLA_MASTER={0x8, 0x4, r2}, @IFLA_GROUP={0xc78}]}, 0x30}}, 0x0) 05:53:22 executing