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"]}, 0x1120}, 0x1, 0x0, 0x0, 0x3ffd}, 0xd) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001280)='IPVS\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001380)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'vxcan1\x00', r4}) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000001340)={&(0x7f0000001240), 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44) [ 2106.512166][T25450] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 17:18:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="620200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:18:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 17:18:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) r1 = socket(0x1d, 0x0, 0x200000009) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000080)='systemuser\x00', 0xb) 17:18:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000340)="0adcf78fa9aa5b1f305fc9eac6d0d2ef") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = accept4$bt_l2cap(r1, &(0x7f0000000140), &(0x7f00000002c0)=0xe, 0x80800) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4}, 0x0, 0x800) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0x6, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0xf3) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) connect$nfc_llcp(r6, &(0x7f0000000240)={0x27, 0x0, 0x2, 0x0, 0x0, 0xb, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836", 0x32}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(r3, 0x0, 0x80000000, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0c00, 0x0, 0x0, 0x20000fff, 0xff070000, 0x0, [0xfeffffff00000000]}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000000c0)=0xffffffffffffff9a) sendmsg$xdp(0xffffffffffffffff, 0x0, 0x40000) ioctl$sock_SIOCSPGRP(r7, 0x8902, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8936, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) [ 2107.283571][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2107.322449][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.328406][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:18:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) [ 2107.402385][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.408369][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:18:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, 0x0, 0x0, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000340)="0adcf78fa9aa5b1f305fc9eac6d0d2ef") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = accept4$bt_l2cap(r1, &(0x7f0000000140), &(0x7f00000002c0)=0xe, 0x80800) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4}, 0x0, 0x800) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0x6, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0xf3) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) connect$nfc_llcp(r6, &(0x7f0000000240)={0x27, 0x0, 0x2, 0x0, 0x0, 0xb, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836", 0x32}, 0x60) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) pwrite64(r3, 0x0, 0x80000000, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000000c0)={0xed5e0c00, 0x0, 0x0, 0x20000fff, 0xff070000, 0x0, [0xfeffffff00000000]}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000000c0)=0xffffffffffffff9a) sendmsg$xdp(0xffffffffffffffff, 0x0, 0x40000) ioctl$sock_SIOCSPGRP(r7, 0x8902, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8936, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) [ 2107.725437][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:18:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="630200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:18:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f00002aa000/0x4000)=nil, 0x4000, 0x0, 0x2010, r1, 0x0) mmap(&(0x7f0000578000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f0000a42000/0x2000)=nil, 0x2000, 0x0, 0x100010031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000def000/0xe000)=nil, 0xe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000baa000/0x3000)=nil, 0x3000, 0x3, 0x100010, r0, 0x2) mmap(&(0x7f0000977000/0x200000)=nil, 0x200000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 17:18:55 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='.C\xc0\x00\x00\x00up/syz0\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/.yz0\xb23\xd2\x15\xae\xc1\xe96\xc3M%\n\'', 0x1ff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) 17:18:55 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, 0x0, 0x0, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:55 executing program 4: r0 = socket(0x15, 0x2, 0xffffffff) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x4e22, @empty}}, 0xfffffffffffffffd, 0x5}, &(0x7f00000003c0)=0x90) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r2, &(0x7f0000000080)="c6dfb06ef8c317d7e48870c34ddb2547b1ada8c6f257ba3d7c5c58fef2ea716468b6d575cdffa4ab34fb4b657b737a25027de3afa248432eeeb6", 0x3a, 0x4000000, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r3 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/10, &(0x7f0000000180)=0xa) connect$pptp(r3, &(0x7f0000000000)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 17:18:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x7, 0x5, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000700)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000005c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000600)={{{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 0x4e21, 0x6, 0xa, 0x80, 0x20, 0x7e, 0x0, r3}, {0x1ff, 0x5, 0x100, 0x0, 0x80000001, 0x80000001, 0x3f}, {0x9, 0x9, 0x20, 0x3}, 0x9, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d4, 0x3f}, 0xa, @in6=@ipv4={[], [], @rand_addr=0x7}, 0x3506, 0x7, 0x3, 0xa67, 0x5, 0x2b, 0xff}}, 0xe8) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r4 = socket$inet6_udp(0xa, 0x2, 0x0) accept$ax25(r1, &(0x7f00000007c0)={{0x3, @bcast}, [@rose, @netrom, @remote, @null, @bcast, @bcast, @rose, @null]}, &(0x7f0000000840)=0x48) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000740)="a260c7ae3d5cde4741153c3df602fb71138a96c9e20f9e658fce65591f8de1efcbfdc6dce1772b2d88570251e787ce34d4db23ce7837bdc2587a695e8d439a19af2791a60590ed59c09d5b1872cbbdd29f686530924685c07b21855bea5d3a7c869110bf06f15aaf4a142eb9a4cb", 0x6e) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev={0xac, 0x14, 0x14, 0xf}, @in=@dev={0xac, 0x14, 0x14, 0x24}, 0x4e20, 0xd821f72, 0x4e24, 0x1, 0xa, 0x20, 0x80, 0x2, r5, r6}, {0xffffffff, 0x81, 0x9, 0x0, 0xf19, 0x4, 0x1}, {0x7, 0x7, 0x5, 0x92bc}, 0x8, 0x6e6bba, 0x0, 0x1, 0x2, 0x1}, {{@in=@multicast1, 0x4d3, 0x32}, 0x2, @in6=@local, 0x88, 0x3, 0x3, 0x9, 0x1, 0x4, 0x2}}, 0xe8) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x40000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x4d) connect$inet6(r4, &(0x7f0000000280), 0x1c) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_buf(r4, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) [ 2108.545184][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:18:55 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2108.602411][ C1] protocol 88fb is buggy, dev hsr_slave_0 17:18:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2000000, 0x40000000000a132, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f00000000c0), &(0x7f0000002600)=0x4) 17:18:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:56 executing program 4: unshare(0x20400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x6, 0x401, 0x0, 0xffffffffffffff9c, 0x0, [], 0x0, r0, 0x0, 0x8000000}, 0xfffffe10) 17:18:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000000)="be099ff7c801bad1b5d631d287a7fe") 17:18:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="640200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:18:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, 0x0, 0x0, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffff5, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 17:18:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-arm64-neon\x00'}, 0xfffffffffffffc9d) r2 = accept$alg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) socketpair(0x7, 0x80006, 0x3f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = accept4$tipc(r3, &(0x7f0000001400)=@id, &(0x7f0000000140)=0x3e4, 0x80802) ioctl$SIOCGETNODEID(r4, 0x89e1, &(0x7f0000001480)) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x40000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) accept(r2, 0x0, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") clock_gettime(0x9, &(0x7f0000000580)) ioctl(r4, 0x5, &(0x7f00000001c0)="7533d83ece925164c8cc78241b3a9d0941e1f2fb2d8d93409721b6d0dbbf43c9813e8ab10f051292964424aca6e692b969cc5fc9e8cc7189147a55d9d740f2b7491c0f9ae4366f6c346568aa4564e806f6f48359f9409fa5b3855cac4ef1d7e5bb1148d4168a1dd4eb1f8e141903d7efc9cd391c1a0c107236a48e4f1e4363620196ba08a3ba323fe0592d2435c7aa7df61a82df7f45fc76552134f0f7359eef7a19795f29e2fe73f66642ab90560efd00263edc31846fd61f2c5301f19a1f2e4d3ac21b918f2ab2df") 17:18:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 17:18:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeaffffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2109.568706][T25563] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 17:18:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$rds(r1, &(0x7f00000006c0)={&(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/8, 0x8}, {&(0x7f00000001c0)=""/248, 0xf8}, {&(0x7f0000000140)=""/6, 0x6}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/169, 0xa9}], 0x5, &(0x7f0000000580)=[@zcopy_cookie={0x18, 0x114, 0xc, 0x5}, @cswp={0x58, 0x114, 0x7, {{0x1, 0x7}, &(0x7f0000000400)=0x5, &(0x7f0000000440)=0x8, 0x6, 0x4, 0xab, 0x0, 0x1, 0x3ff}}, @cswp={0x58, 0x114, 0x7, {{0x7, 0xffff}, &(0x7f0000000480)=0xba9, &(0x7f00000004c0)=0x3, 0x81, 0x101, 0x8001, 0x5, 0x20, 0x9}}, @cswp={0x58, 0x114, 0x7, {{0x0, 0x800000000}, &(0x7f0000000500)=0x6, &(0x7f0000000540)=0x8, 0x3ff, 0x5, 0x7, 0x84, 0x2, 0x7ff}}], 0x120, 0xc001}, 0x80) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001280)={0x14, 0x23, 0x829, 0x0, 0x0, {0x6}}, 0x14}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) 17:18:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000140)="0adc1f023c12") socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000400), &(0x7f0000000440)=0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) r2 = socket$inet6(0xa, 0x80001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000280)=""/158, 0x9e, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x8912, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4004800) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000c40)={'vetl+\x92\x1d\xbd\x16\xdc\x85idge\x00', 0x400}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0x0, 0x1}, 0x20) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) unshare(0x40000000) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r4 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x8, 0x7, 0xfffffffffffffd92}, 0x8) r5 = socket$nl_generic(0xa, 0x5, 0x84) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x800, 0x4) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test}) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000180)={0xffffffffffffffff, 0x6, 0x1}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000500)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c8, 0x270, 0x0, 0x0, 0x270, 0x3a0, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x6, &(0x7f0000000480), {[{{@ipv6={@local, @local, [0xffffffff, 0xffffffff, 0xffffff00, 0xffffffff], [0xffffffff, 0xff000000, 0xff000000], 'gretap0\x00', 'syzkaller1\x00', {0xff}, {}, 0x3c, 0x80, 0x1, 0x8}, 0x0, 0x158, 0x180, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x84, 0x2, 0xffffffff, 0x9, 0x2fe, @dev={0xfe, 0x80, [], 0x1c}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0xffffffff, 0x0, 0xffffff00], [], [0xff, 0xffffffff, 0xffffff00], 0xa0, 0x1200}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@remote, @rand_addr="ec03bbc6eb44cf3a60bc6541b381a9ae", [0xffffff00, 0xff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffff00, 0xff0000ff, 0xffffffff], 'nlmon0\x00', 'lo\x00', {}, {0xff}, 0xff, 0x2, 0x5}, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x6}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xff, 0xffffffff, 0xff000000, 0xffffff00], [0x0, 0xffffff00, 0x0, 0xffffff00], 'ip6gretap0\x00', 'netdevsim0\x00', {0xff}, {}, 0x2b, 0x8, 0x6, 0x60}, 0x0, 0xf8, 0x130, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x89, 0x6, 0x3, 0x7fff, 0x7fffffff, 0x800, 0x20}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x1f, 0x6, 0x40}, {0x8, 0xffffffffffffffab, 0x9}, {0x1, 0x8, 0x6}, 0x2, 0x100000000}}}, {{@ipv6={@loopback, @mcast1, [0xffffffff, 0xff, 0xffffffff, 0xffffff00], [0xff000000, 0xffffffff, 0xffffffff, 0xffffff00], 'caif0\x00', 'ifb0\x00', {0xff}, {0xff}, 0x3e, 0x3}, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@mcast1, @mcast2, [0x0, 0x0, 0xffffffff, 0xffffffff], [0xff000000, 0xff0000ff, 0xffffff00, 0xffffffff], 'lapb0\x00', 'gretap0\x00', {0xff}, {0xff}, 0xbd, 0x8, 0x6, 0x34}, 0x0, 0x140, 0x168, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d3, 0x4d6, 0x100000000, 0x1, 0x2}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x94a, 0x2, 0x1, [0x2d97, 0xa05, 0x8000, 0x7, 0x81, 0x8, 0x4, 0x6, 0x1, 0x18cc, 0x7f, 0x7, 0x7fff, 0x10000, 0x0, 0xffffffffffffff01], 0x7}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x1, 0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x728) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) close(0xffffffffffffffff) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) 17:18:57 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c21400000180c200000086dd6076605100303afffe8004430005000000000000000000ffff020000000000000000000000000001860090780007020060c5961e00000000ff030000000000001803000005000001ff020000000000000000000000000001"], 0x0) 17:18:57 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2109.962432][T25574] IPVS: ftp: loaded support on port[0] = 21 [ 2110.138383][T25584] IPVS: ftp: loaded support on port[0] = 21 17:18:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="650200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:18:57 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000001c0)={r0}) setsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000200)=0x9, 0x4) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000280)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "9645e89650196a1a", "45b6e022dbf1fb07ff029bb594c2dcd09a59ebdbe2da06595dfd2797fa4d91bc", "b2d2c111", "b2134e61152bd8a8"}, 0x38) sendto$inet6(r0, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000240)="2a41d51d457df137449916640800c339c8", 0x11, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)='>', 0x1, 0x8000, 0x0, 0x0) ioctl(r0, 0xa42, &(0x7f0000000580)="03d4ed7b25ce67bcffaeba5825a4c82afcbaeea90cea291fcebcd0b5793439608ae4de5c17dfde79f13f3381d75d5bc707dc97b1f36679c3fba17029692276916781958a3890a77b42b30f0f327841f4d8ccc8fea65bd6830836eb620d17da359177f4f6e60508bb9c0a61c6706fca4d8c0e5a1c59a17cb0798eb475630222d38734ef9ff83b44a7ccca9182670b51ebceb05026fd0455746ad26eec938233e19c7aa0e27c4a794d53049248eed813bf9ee8584fa9a5abf1a420d8354fd0159702df0effdfe39af8290c5f98f4b6af8dd817c1f765e8f1a16ef28d423b7aab9eb7d7472c69595149c107b45be7d2072e04aeeb45ac924f805258f8585dfe527d2651cb06754a8502eeab53d79ed987d37b625c72ecf1c8fac34f4b559d107621a8b806557eb55e2148af241bb6cd229c4d7767857daf5e6dc52dbf4f05fca519a57dcf98a2cc8a9a4db75f6c5f480a10e1d96582fefa62c8a15a4192218c983d9fb857749d141a8d402b19dc77c1fbd78134250776960e7c7d94cd43cc5f9f67f286b8a38782b9e8b136c371824a2340810b768bc31a84b71635498468b0962bdce79b9ab3abf60042f8f36537b4faa8fea497d8b11acc779ea73e5d84ec45dfb558416211507b8074daa3802aff2282dc24e12fc2a830208d351f49b4ef8d2b3f0f99acd3792ae111e78ea9337186d02f9d536b67da7bd26b33d75f1ba57f5566260a562d83a5df2ed4c89fa634c20a17d85348cb3ed0091ca0623baa70431e646769dba6f16ec56b08788e0e81ac75311926f83ca809ceecad21ae0e1c468be4dfc5d6690de170a2b8a3d5e5c708a153ccbe36cd6be47c4d29d8e5360d4b0ee5cf548a5165b761775bb26637e9b795f78e62635fc633e94a10e09311b12285bb60913ce65410ffbcb115a5a02726a6448937ac0a0146b58a215f2d93f9dc8bc21695ae1b6b95c76b26457cfdaaa56ef7a5e541f5892efe362e5a007d12ea8c1ff29a7ddebad66882ff6eafcd4f39d1ed10759b048d01f40e295007834dd3aab6ccc4d96b064ffcea1eb7875506db5cdb8f3696b128ed95b37fd3212c6753234bd07fcfb6e128ced7fe7cc5372f651d3ebf76b3fcd9744aff060a186fbcccc4e925d7332c6636fa157c3956f259fe1c35255fcfc39893ddb7f94ab408ba1f644c794690518ef2cad6a0080881154a4b3acf247269b98e33c89b1100d338442ff31fd23381536ed228a00176bebee1c6704242407c19607ab1c2b14f77ad0b5f4dfee3e119bde77b986f2c9760334d6ffd22e50eec44c2d52c7b001ba14641cc241322da78949c946ce98ebe759e09be64279994a97e333721adb8660996e745274e1982550f176f29500ad2c278e96cc044f91113ec3653fc50423b0e6cb62b58a6b4fc1ebd75b22ad29ad252a68d54b52d5787f3efbe663233a32037eb31b743772ae942a729308ea7e50bd6260f51c7e2a931ea8258c676165b00b27d0e1a767f2287047759e924a3873417923ea9e8ca5599db5c86c42f34c5ee467f843d2cced23249ee79a4c445a27d258e8a4f01a0e5ae6bcc605efead0023ae016bb172442652f50e98bc08903ab73595425b0746679e71525c8b738adcace702dc452eda1de832eadecb822950bfd124223c7873f6208a228cd428b91e3ab3a7be324ec3f94f1ccdb5648ecf51e6e3aae89598e249ef465d11e9be45cfc5ccc0acef8db9b2eafa60e0ab93d314ef50c02bdfd38ab2784889f861800ae41b83e4fea5cd5281e06623ebf20512f5e3633513fab59052befe647200d48aff2ecc2f32506b4adb73f289b62a8c77b0a0cadd59295d28b81f7270a65f5ee9a8621dc1b22e43625f87ebc1ebdbc6e4c52950eb4ffc2beb1a2615056b681274ab0a82ea3cf576aca4c0a02a5971e2e7bb1bf421db60cd6265845b37842c239867cfe479b2d51f81709b8f939b375c7a733852131ea970e8f8222b6a5998c313a8aa7401592c81de7a9305a84c7207ace1ce05e51e116b8daae180c5c796c5cddd597af0896fb6bf0448ae7ced637531c29f4ffef3f80273356208aa017d009fcf241e27d9dbb46b16cb42b430398abfbb8e83ad861d32cffa2e035adb916d44238b9d5b2078deb76bcb36300491d1aca1454ed154fcc8b3616d2429f9186e062e972aa401370dd76acb529af8dfe9634975cdd6ed977804df85f126c0d7d745deb936b222817777aa0e2e89e0d0b068bb6ada072d73733d7373742215e72b091fd4960617a8a3dfe839e38bb8963bac47fdb1103ff122ce3498b05f918ca58607f30625d91fd7f74ba72b856712d409a33ef5f4ca79b7c9b25b1ee85a114db87a26b6612e94299370fc9a84537e3c4b47c03cb3ab42f7d77855f08c6c7ba7cd9b274e8a234ae03ec0f3d0f9698cdb684b03e8043f8a0f9b6d6f140fdbeb11765470a0bbb0653d28c52a71a1660a0e3b5705ba6183e0221b0a881d9f40a3c4676ba39060f3b4f74fb82c19e2265ebbbe04f4b0c09898ecd5d8f5eec3052d4befe655ec0d03a2bfc1027d3bd98e88e8bfec114112399a1957c6b0286483b624b828153579c57b502aeed9e6d1d154abec342e7a6292f60b2aeff39727eb60da94833e4ed9adfbc5f51dd99760151afa20ec8209a901cc38f59de69d558b8d203bdb142de460aa3cfe41272166891d045526d1d05f4f36479017be18d1e4c6fb7c6bc1ffa8230edb17519e1c09c321f613e1cb12065d598044b9850206ed65f2e756caab79a821ee9b97198049fd4f6263e88f492aeaf1ac46c21c2b54268d244337307c9ada5f0c8037fc03b047386585aea783bf64214d354bf095ca3a2a1db7e5cb07148d04bf9caf0f3069114750a6367188af725e42a13138f1e178eb2b98187ee539304f58f11d8671dc267a5f0d8f3653e0060516f4230b273d578e28b8e40a381aeeed0530220965589d0e76e046acc3bb97f74b4b59f233c1633f98cf77d28a9ada70ae76f626249bb9bd0c7cd9d210a2d575ae276341029078832028b717270be00fa4a2c1f080963475f069b0a8ea1a7bd8ae1b84334de23e6162e20e5d84f2e1c6adf29e4547f8a1952eb7e646c92c1b974b4f8ac5c031f1ee2a16e878d229ae0038687d9c11bb9c28123ae508daea6bcbef2333487811d5a2d56956eeb52249c2e8f8eeeda19366fa96c8812c2447139229bfdb55e45ec195f0e0ab6508b1548db4bd32e575e84876766577227fb25784db38f29f9b9de4b815ebcd84fcacf9529d029501325a6d5453769c008324c440eac56032964dc737f0b37d30f20345432edb1f94ad8e4765c97fbd9e6bbcfa11090fb840a8a5fc6175e283d70db6708f47037872d5591f1efe9dc328922333c745866be5e929c904adf3d1c6e013459437b1a49f1b901961420d39f82a61a5fa676a52e954044d592e197fe522af96cc039df46a051f36ea4d971188bf16e9ecf19de5356d33587c29b2f6351f7627e18c68292125d64ceb0f1799f221d3f6e6f6d64e1af29c49bd64ee4e12ec3a95a7ca314a54af022fd9f8fc3b274e04599152ffb607bf85596276028980d54755efaa7a5df75fa77fb8a8d2abbd6b660ad5d16d4335eb624e3b5dcc2f239c27d4461f735172e899ec461bfe7a17aee69da6995f1ec15558e891988ba6199a5e84d0c021c163e2dd852dbc9f5b01f05624937979cbb55ee7b8641dae4bc4b3f9c0baadb81fe9a9baed4c07ac540c867f15b231793b69534d454ab7161ca861c3728bb8630cddc110a328113c2a25a6e6195b895abccbdc731f411927187213184faa2a8a74b842f112c43974c643a1b9a7e1185c90282b685eceb9c56a9b239a869762e8c409d126f065f8038506d7f5ebd608f0aa2bb29e596d13c62ec1fd01e39b89b7c6cfb127123a271496392d681344c34e649736ed6392bc0659bf192fcb0783f045feff611b88195d4852adf0dea13e343f1e295096a9cf904a7ee71a66433d4e0954f1888b607643d4090e07f3c36952bcca84be3cc1b072ed303af8a9869e874dbf54bc537f5919b8ca60aef0ad8f9b77a6c1a472750d680564b245e4d951ac5f419da75d2ec995d1ca760a7d9cf2a057bb868d720237d53050b880d2b2b4c67a6ec4c0a299c154169fcd25035d501995a32a884794dc8f6d1c29ec2a4736a9ef6a5923d9e8c1d6c6842f0e2a58bae3ca1d5d3e5388a6bc4cd3f91248efe490ce66824b875d6c7dedfdbf5662cc1dcecdad329a2a9d59cac965191d892387ad8fc6bccb009c7a4dbf5822a2fc4a06dca11bd3fe804053a6fab9e8c33416e2b8b86ab76cd8b12acd8f18d6031cbda46926b33158de443b0f9268c8d5d26b0a675665f4753ca5c068826b52de005c1a8c69fcf13a45ef4ec555c144a4afbef5b3a76bccb49834bdec993c349389fb85558e0d45ae1fca81e39a8d12b69d9b28ed93d74e415d1b48b92571cabd1ab54694e14aa4ece2bbfbf9b86df24a509d104413405472d48e01b2eddf3755276b12d387d0c7ad523a24686db1fe52f6c37e127d7880b0b6043338915d734e7fa4c0025e4e511288f6970c9a797df0c8d811d9cc73d74a8b5b34fbc9d2520fc57a6820f922b4c8963e7388254fc031e11b2f2aab8ebed6c33cda84ef704c3279137d44786b39db0d19c392c0d371724d26d47a94e30de6c2b9b419ea9c7390a44d7272e1e4d2153b91779469b3b35d9a7ea56873f7da22bed747c0156a5db4abdb5bb49309044ee3506cef29806d35798a14e05c1b2304746c04e5fe822957e8720c594bde593046553b17acb36c009b0deccb538e6e60363928ca36487ef058dbcf670bbd28e4ea2cac93370d8b3101580450e9d2d22f4d58fed002c775e60eb9f0cc0e98ff91348500eee227d8e0dbc6f35f92dc8d1a2cac54dc33ce5fef00865ff6b83f1df326c36c389c43a25727d0501f43fcf5af40528b68d71184fb8cbb7869945201494dc231654b815224c17a40e38fbee3566157928a28f375c38e3134c5cdd617056a9fcc48a0185c7779b0bc6daed28f12c3ceef8916efe19bcb070a9f97f122616e697600ede3aebc8089dd41d8632f5a72a80e659128091529b84c7216a69105c018a111262f88e7d73388ea7b50d404ea5d9e2c474c2369807f66b5fc2f1aa344c813fe9fe6455e6dca2bc5c4024b31e27022cb2f82b688bd4077127f85e74ca57149ba32ff1d505b624326cd0033648aab952fff89eb8c8d1be46e4cdb0d171f9c1d5491476b24a4036d9737db4c98c5f271992a17bb62dc611b826cd88aace5ad8fee694585fc8a2873f3ce06807a0f6e7d92a96601bc0c6d65326ae7e8d86a3c4b44d6c95cd4989dff8baae9c5d6d74e751e4582d77a90d44dc8b3566b359185bf003b26466b870d44b13e4e86cd0a9ed85da51466db1b3ab21abb00e417095bdb8a0394dfaa73dce1d6136e3cadbda3643fd33ff37436e8aad7638c2bc598e63034b4515aea3059e2f801d47c55419b9c9181736201fa55770156b52be21daef05effb9be709055fafa990915dc5df9e2fd9b1277eaabe03d0caa961787c359058b7ee3df500762a9ea0959a8a523ec325e2590b3c92cb617d62fd14e16b5f69abeaf6cbf6516a2fc40896fdf828423811bd6bb9e5397b15db876900c92ed00091d4c9617566fc82d6e10db39c1e60d77c637e736ddd859907eb0f6eb6aa7bb01b49f3597021411be4f053c173531690c4e0b4cb06b8e886a0d23aa7af95cd83d57461d63b3408333e0a5417197e2e562f2ce9a1546f2e604fcf05c42ac9177d774a1486b8dab6c") 17:18:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x23, 0x829, 0x0, 0x0, {0x2804}}, 0x14}, 0x1, 0x6087ffffffff}, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80c0}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x44, r1, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x0, 0x9]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) 17:18:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0xfffffffd, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c8b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525ff015e2c4707a000d47a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "f0f3c23db58cbd48", "4a80970c81539622b93494f5266177be2f653d878723c5509f129ac6b5d7f2a9", "43d5f174", "ef770a7deeb0ad10"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) recvmmsg(r0, &(0x7f0000004dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010002, 0x0) 17:18:58 executing program 5: r0 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000080)=@short={0xb, @remote, @default}, &(0x7f00000000c0)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000100)={'veth0_to_team\x00', {0x2, 0x4e23, @empty}}) r1 = accept4(r0, &(0x7f0000000180)=@can, &(0x7f0000000200)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=0x0, &(0x7f0000000280)=0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x10000, 0xb3a, 0xc7c, 0xfffffffffffffffc, 0x4}, 0x14) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000140)={0x7e, @empty, 0x4e20, 0x0, 'dh\x00', 0x4, 0x4d, 0x1f}, 0x2c) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa63d7b9c7597986dd60b4090000303c0002024300600000000000ffffe000074ee0558a789af491ebbb6b83460002ff0200000000000000000000000000012c0690780007040060b680fa0000000000000000000000000e03ffffffffffff0000"], 0x0) 17:18:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:58 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:58 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000540)=""/122, 0x0, 0x1000}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) [ 2111.062994][ C0] net_ratelimit: 16 callbacks suppressed [ 2111.063005][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:18:58 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x8c) sendto(r0, &(0x7f0000000100)="9e", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) socketpair(0x19, 0x8000a, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000380)="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", 0x1000) read(r0, &(0x7f0000000280)=""/232, 0xe8) close(r0) [ 2111.402573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2111.408529][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2111.482429][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2111.488291][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2111.562350][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2111.568353][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:18:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="660200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:18:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockname(r0, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000280)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000400)={0x0, 0x3, 0x3f}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000480)={r2, 0x5, 0x10}, &(0x7f00000004c0)=0xc) r3 = accept4(r0, 0x0, &(0x7f00000002c0), 0x800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000300)={0x0, 0xffffffffffffffc1}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000380)={r4, 0x1}, &(0x7f00000003c0)=0x8) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'lo\x00', 0x5}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom$inet(r0, &(0x7f0000000140), 0x0, 0x102, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) getsockopt$inet6_int(r5, 0x29, 0xd, &(0x7f0000000040), &(0x7f0000000100)=0x4) 17:18:59 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:18:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc0b12f3a841068bc071") sendfile(r0, r0, &(0x7f0000000000), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002d8000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x3e0) 17:18:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:18:59 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2112.501370][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2112.539340][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:18:59 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2112.682365][ C0] protocol 88fb is buggy, dev hsr_slave_0 17:19:00 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:00 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @random}, &(0x7f0000000080)=0x80) sendmsg$can_raw(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0x10, &(0x7f0000000180)={&(0x7f0000000100)=@canfd={{0x1, 0x3, 0x4, 0x100000000}, 0x33, 0x2, 0x0, 0x0, "e3024e099dc5d9bdc2815e03a3075bacd3599474ce8bff3c4d3aea12c32eaa67608dab29bf115b4fbf0b9c1affdf8b0c4aa67831f8d6cae8930f0550e43f898a"}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, 0x0, 0x26}, 0x20) 17:19:00 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = accept(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, &(0x7f0000000100)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r2, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x646}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x20004040) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="24000000000207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 2113.062090][T25686] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 17:19:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="670200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:00 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:00 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x2000000110, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xd) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000002c0)=0x40, 0x4) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f00000000c0)=']vboxnet1\x00', 0xa) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000340)=0x4) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@llc={0x1a, 0x33f, 0x7, 0x8001, 0x40, 0x9, @dev={[], 0x16}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[{0x68, 0x10f, 0x8, "7037bf7495bfe25688ed88ed66822ab7ace04dc0ed27a7b95ba7ddea9a2f68ab44991c4a361d4faa10ff30f8baefd63ff6922cbb829ff213688fe12e41125f7f40996c7c6c273786d1df4e5bbf2d78394180fa871c"}, {0x28, 0x10f, 0x1f, "9e827f09247c41874ec3b6074c9fee745760864ed3985878"}, {0x58, 0x111, 0x200, "f0c89a7c59fd89f70e18866f92e7731834728338926e925cfa0d77563f9d82e349ccc23d2a785af78c019a083986835c22c72dc85317d0b28f81fbfc3cba2830ae"}, {0x68, 0x11f, 0x9, "dd877949ece090a11361cae750513fc7b337b482eb4a8c56a98e03d77908a54a2347fc2b704b9fb3a7059d6ea784199b2264f2903527d9ec19c7863b13c75fa9f3883d92c737c0854b0cf66f077ffe25319e6302712d75"}], 0x150}, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x2, @remote, 0x8}}, 0x0, 0x3ff, 0xfffffffffffffff8, 0x8, 0x20}, &(0x7f0000000440)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000480)=r1, 0x4) 17:19:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) vmsplice(r2, &(0x7f0000000040)=[{&(0x7f0000001840)="f8", 0x1}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r4) close(r5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x4) splice(r0, 0x0, r5, 0x0, 0x8, 0x0) 17:19:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000000009) r1 = accept(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000001d80)=[{{&(0x7f00000002c0)=@un=@abs, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="5000000000000000ff00000007000000fa01578375085b5e8dd36ca068b5f124c4351f8afc3243c8cccdcbdbd90c2ca31ecd334d6fda7368ee224fcabc8650630623a39a8ddd8511d7bf733a16000000b6926b6e60167fceab3ab9e8775bc3db70c216d9291f681a7804e8aac8a7f65edaf19d3d05d05616c22da6cb9e43847d009ac9416d203a9b4a81d14343effe58f666db05ce4a3431bdcbc97697fe23bacab72ce1ef10fce979f6cfc9a680667f53003c36267fac6971e21e72acf2770b1da35aebabec1454a7edf3a7aa4ce0da5d4b7e2b35e1a2755ae53ed34c174b68df398041e2b11bf34a0f3d640ee9e4d93555f822c186181d6a"], 0x50}}], 0x1, 0xc001) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'veth1_to_team\x00', {0x2, 0x4e23, @local}}) 17:19:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0xd0, &(0x7f0000001400)=""/203, &(0x7f0000000040)=0xcb) 17:19:01 executing program 5: r0 = socket$packet(0x11, 0xffffffffffffffbd, 0x300) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000080)={'bridge_slave_1\x00', @ifru_addrs=@tipc}) 17:19:01 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="d73d88a59a1b4f021d24f24a8a91199f", 0x10) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) pwrite64(r0, &(0x7f0000000000)="1eac71b33fb79b35d037526b006a8441fd893094847e90d8cd0a82d38426d84397cd6e6c62b75974651c2446fd58e4d714beb4698a0cd0081981204ff8f1d608ef61f064042ebd1f1b9035450a034a728803ad715c44", 0x56, 0x0) 17:19:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:01 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="680200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:02 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:02 executing program 5: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hug}tl\x04\x04\x00\x00\x00\x00\x00\x00age_ir_V\xaa?\xb0s\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000180)=0x10) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) socket$inet(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0x0, 0x300000000000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 17:19:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = accept(r1, &(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000080)=0x80) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000340), &(0x7f0000000140)=0x60) setsockopt(r3, 0x2000000000010d, 0x4000800000000a, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100fffffffd, 0x4) bind$inet(r1, &(0x7f0000000400)={0x2, 0x4e22, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) r5 = accept4(r2, &(0x7f00000001c0)=@ethernet={0x0, @dev}, &(0x7f0000000000)=0x429, 0x800) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x247fa250a1c391b1) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) accept$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) connect$can_bcm(r5, &(0x7f00000003c0)={0x1d, r6}, 0xfffffed5) shutdown(r1, 0x1) 17:19:02 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:03 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2116.051952][ T27] audit: type=1800 audit(1558113543.299:367): pid=25755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="cgpoup.events" dev="sda1" ino=16516 res=0 17:19:03 executing program 5: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hug}tl\x04\x04\x00\x00\x00\x00\x00\x00age_ir_V\xaa?\xb0s\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000180)=0x10) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) socket$inet(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0x0, 0x300000000000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 17:19:03 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2116.137154][ C1] net_ratelimit: 10 callbacks suppressed [ 2116.137166][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2116.138917][ T27] audit: type=1800 audit(1558113543.299:368): pid=25751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name=6875677D746C0404 dev="sda1" ino=16865 res=0 17:19:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="690200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:04 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x5}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000200)={0x6, @local, 0x4e22, 0x0, 'ovf\x00', 0x1a, 0x4, 0x46}, 0x2c) 17:19:04 executing program 5: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hug}tl\x04\x04\x00\x00\x00\x00\x00\x00age_ir_V\xaa?\xb0s\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000180)=0x10) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) socket$inet(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0x0, 0x300000000000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 2117.171103][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2117.210452][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:04 executing program 4: r0 = socket$inet6(0xa, 0xfffffffffffffffe, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) getsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000140)=0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000200)={@initdev, 0x0}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @dev, @loopback}, &(0x7f00000002c0)=0xc) getsockname(r0, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000380)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) getpeername$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14) getpeername$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000c00)={'team0\x00', 0x0}) accept4$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005440)=0x14, 0x80800) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000005480)={@mcast2, 0x0}, &(0x7f00000054c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000005680)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000056c0)={'veth1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000057c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000005800)={'vcan0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000005840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005880)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000005e00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000005dc0)={&(0x7f00000058c0)={0x4f4, r2, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xac, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x1, 0x7ff, 0x100000001, 0x101}, {0xfffffffffffffffd, 0x7, 0xf, 0x80000001}, {0x1, 0x401, 0x100, 0x80000001}, {0x8001, 0x80000001, 0x20, 0x8}, {0x4, 0x8001, 0x6, 0x2}, {0x3, 0x9, 0x4, 0x2}, {0x0, 0x7, 0x5, 0x108}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r4}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x134, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x1ac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3732}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}]}}]}, 0x4f4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$l2tp(0x18, 0x1, 0x1) 17:19:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2117.411230][T25815] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xe2e/0xf60 17:19:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2117.603931][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2117.702322][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2117.722436][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2117.728347][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="6a0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 17:19:05 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:05 executing program 2: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000180)=0x4) socket$unix(0x1, 0x5, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000d97dd529020000000000000000150100001800040000000000ffffac14140000001d00000000000000c0e74e08e4470d4f540e8c2ed1c622f73a5ef30609f91515357d8a738ac0ff97a72b8ce01acf95ebf018db8a4e0a3a15916cc139fb81a04a189c8f3b81b842c7f8fb1539ff8cdb7a8e977a8020874f1e27bcc2c6418fda8b96400c1c59d97e73d76fe6c2f3b069aa3928bce1fa0569a7756e"], 0x2c}}, 0x0) r1 = getpid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)=r1) 17:19:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000b400a000000053582c137153e370900068000f01700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x4000000000000}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 17:19:05 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2118.369321][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2118.404926][T25857] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 17:19:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0xb18f, @ipv4={[], [], @empty}, 0x1000}, @in6={0xa, 0x4e22, 0x2, @mcast2, 0x7fffffff}, @in={0x2, 0x4e24, @rand_addr=0xffffffff}, @in6={0xa, 0x4e20, 0x0, @mcast2, 0x9}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0x9, @loopback, 0xc000000000000000}, @in={0x2, 0x4e20, @remote}], 0xb0) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x4000000000004ae, 0x0) [ 2118.431767][T25857] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 17:19:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2118.503920][T25861] netlink: 'syz-executor.4': attribute type 11 has an invalid length. [ 2118.541721][T25861] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 17:19:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e0, 0x0) 17:19:05 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:05 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2118.690071][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:06 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0xfffffffffffffffd, @rand_addr, 0x5}, 0x6) listen(r1, 0x4) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 17:19:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="6b0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @local, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:06 executing program 5: r0 = accept$netrom(0xffffffffffffff9c, &(0x7f0000001440)={{0x3, @rose}, [@bcast, @rose, @default, @remote, @default, @default, @bcast, @netrom]}, &(0x7f00000014c0)=0x48) accept4$netrom(r0, &(0x7f0000001500)={{0x3, @null}, [@rose, @netrom, @remote, @default, @null, @remote, @null, @default]}, &(0x7f0000001580)=0x48, 0x800) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e280000000b0affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000020}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1b010100fab73bafba938458c925d3df25030000000800f2ff4e230000080001004e24000008000a004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x4008011}, 0x80) 17:19:06 executing program 2: socketpair(0x2, 0x0, 0x2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) r2 = accept(r1, &(0x7f0000000080)=@ipx, &(0x7f0000000100)=0x80) accept4$inet(r2, 0x0, 0x0, 0x80000) 17:19:06 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2119.396208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:06 executing program 4: unshare(0x6c060000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000005640)={0x0}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000012c0)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) socket$xdp(0x2c, 0x3, 0x0) socketpair(0x2, 0xa, 0x80000000, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000001100)={r0, 0x80000001}, &(0x7f0000001140)=0x8) bind(0xffffffffffffffff, 0x0, 0x0) 17:19:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000d2effc)=0xfffffffffffff432, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x408, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x5) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f00000001c0), 0x223) 17:19:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2119.617087][T25908] IPVS: ftp: loaded support on port[0] = 21 17:19:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x3b9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@delrng={0x10, 0x14, 0x0, 0x70bd27, 0x25dfdbfe, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8010}, 0xc000) bind(r0, &(0x7f0000000000)=@ipx={0x4, 0xfffffffffffffff8, 0xba4, "5b54140f8fe5", 0x7}, 0x80) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) 17:19:06 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="6c0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc01003c123fd95d34ab") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e280000000b0a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 17:19:07 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:07 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa8b1bac7f727b86dd6083d98e00030600fe8000000000000000000000000000bb00000000000000000000ffffe000000100009078000000060000000000000000"], 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x8219, 0x2}) 17:19:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:07 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept(r0, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000200)=0x80) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000240)=0x20) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x4000500}]}]}, 0x24}}, 0x0) 17:19:08 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:08 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x9, &(0x7f00000001c0)=[{0xdf, 0x20, 0x9}, {0x401, 0x5, 0x80000000, 0x1}, {0xfffffffffffffe00, 0xb49, 0x8, 0x4}, {0x7, 0x1, 0x8, 0x7}, {0x8001, 0x80000001, 0x9, 0x5}, {0xceb, 0x7, 0x20, 0x7}, {0x1, 0x80, 0xf, 0x9}, {0x7, 0x6, 0x1, 0x1457}, {0x0, 0x1f, 0x80, 0x9}]}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) sendto(r1, &(0x7f0000001780)="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", 0x30e, 0x4000, 0x0, 0xacdd9e7d) setsockopt$sock_int(r1, 0x1, 0x1f, &(0x7f0000000080)=0xda9, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x10000}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r3, 0x100}, &(0x7f00000002c0)=0x8) sendto$inet(r1, &(0x7f0000001600)='\b', 0x1, 0x80ff, 0x0, 0x0) 17:19:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="6d0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:09 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) 17:19:09 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000180)=@in={0x2, 0x0, @remote}, 0x80) r1 = socket$kcm(0x2, 0x7, 0x73) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 17:19:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x20}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x1}) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) write$cgroup_int(r0, &(0x7f0000000000), 0xff2a) 17:19:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0x400000000006) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) accept4$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80800) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x7, {{0x2, 0x4e21, @local}}, 0x1, 0x9, [{{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e1c, @loopback}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}, {{0x2, 0x4e24, @rand_addr=0x100000000}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @remote}}]}, 0x510) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000740)='hybla\x00', 0x6) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000780)={0x0, 0x8}, &(0x7f00000007c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYRES32=r2, @ANYBLOB="0300f0e27448962c6974574b47df0285030054000600ffff"], 0xe) getpeername$ax25(r1, &(0x7f0000000840)={{}, [@null, @netrom, @bcast, @bcast, @rose, @remote, @null, @default]}, &(0x7f00000008c0)=0x48) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) 17:19:09 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2122.172000][ C1] net_ratelimit: 14 callbacks suppressed [ 2122.172011][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000fd", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000000000000741000000140018000000047564703a73797a3000000000"], 0x30}}, 0x48081) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={0x0, 0xfffffffffffffd61, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{0x1, 0x0, 0xffffff8d}, 0xf000000, 0x400b, 0x448e370e0511d35e}}, 0x2fe40}}, 0x0) 17:19:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) 17:19:09 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) 17:19:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$pptp(0x18, 0x1, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r1}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x5, 0xd, 0x80000001, 0xffffffffffff0000, r4}, 0x10) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000000)={'gre0\x00', @ifru_addrs=@in={0x2, 0x4e20}}) [ 2122.506255][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="6e0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:10 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) 17:19:10 executing program 4: r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000100)={@default, @bcast, @null, 0x8, 0xdac, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0xab) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000080), 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x80000) socketpair(0x10, 0xa, 0x7, &(0x7f0000000180)={0xffffffffffffffff}) connect$netrom(r3, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 17:19:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) 17:19:10 executing program 2: syz_emit_ethernet(0x157, &(0x7f00000001c0)={@link_local, @dev, [{[], {0x8100, 0x40450954, 0x80000001}}], {@canfd={0xd, {{0x1, 0x400, 0x7, 0x3f}, 0x24, 0x0, 0x0, 0x0, "a101bfbfda03c6a627e20f5ba613cdbe534d15e2446ec8d48531aaf3eed2fdd8ce4e2c671bf522f5beb9ffe94b5cfe2ad1ca79f0913063c51e299eb9e738c978"}}}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x90, r1, 0x300, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x697}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x38c}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbb}]}]}, 0x90}, 0x1, 0x0, 0x0, 0xcaeb9a831992d4b0}, 0x80) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={r3, 0x2c, "2f52bc9838ecaa557eae5b3aefa19c028733ed958ebdfdd5ea09179d78b02167181d6794f7b0ac2ade0e99c7"}, &(0x7f0000000100)=0x34) 17:19:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8400000f, 0x4, 0x4, 0x5b615fae, 0x0, 0xffffffffffffffff, 0x200000000, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) sendto(r0, &(0x7f0000000200)="6d4b143f4da5cce4c6a26131a056c38f2ac39282be897a0bc6277ce6c0374dfdacb809229b061724b73a3696ffa05aa02e8c6334d60a6bbdbdcf5884f6697f57f46d9c2cfe7350a81300b46f8b53df1fd9fc2270155d80c5d78e1ad33d77ec550a3f9df02d7bc66e77f0a6d98bafbef7008f648ff67948", 0x77, 0x80, &(0x7f0000000280)=@rc={0x1f, {0x8, 0x5, 0x1f, 0x2, 0xfffffffffffffff7, 0x1a7}, 0xbfed}, 0x80) recvmmsg(r1, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/229, 0xe5}, {&(0x7f00000004c0)=""/97, 0x61}, {&(0x7f0000000540)=""/156, 0x9c}, {&(0x7f0000000600)=""/104, 0x68}, {&(0x7f0000000680)=""/222, 0xde}, {&(0x7f0000000780)=""/122, 0x7a}, {&(0x7f0000000800)=""/217, 0xd9}], 0x7}, 0x6}, {{&(0x7f0000000980)=@x25, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000a00)=""/167, 0xa7}, {&(0x7f0000000ac0)=""/185, 0xb9}, {&(0x7f0000000b80)=""/106, 0x6a}, {&(0x7f0000000c00)=""/91, 0x5b}, {&(0x7f0000000c80)=""/119, 0x77}], 0x5, &(0x7f0000000d80)=""/43, 0x2b}, 0x8001}, {{&(0x7f0000000dc0)=@sco, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000e40)=""/8, 0x8}, {&(0x7f0000000e80)=""/224, 0xe0}, {&(0x7f0000000f80)=""/61, 0x3d}, {&(0x7f0000000fc0)=""/206, 0xce}, {&(0x7f00000010c0)=""/187, 0xbb}, {&(0x7f0000001180)=""/9, 0x9}], 0x6}, 0x3ff}, {{&(0x7f0000001240)=@caif, 0x80, &(0x7f0000001600)=[{&(0x7f00000012c0)=""/247, 0xf7}, {&(0x7f00000013c0)=""/150, 0x96}, {&(0x7f0000001480)=""/98, 0x62}, {&(0x7f0000001500)=""/223, 0xdf}], 0x4, &(0x7f0000001640)=""/179, 0xb3}, 0x5}, {{&(0x7f0000001700)=@nl, 0x80, &(0x7f0000001900)=[{&(0x7f0000001780)=""/105, 0x69}, {&(0x7f0000001800)=""/127, 0x7f}, {&(0x7f0000001880)=""/117, 0x75}], 0x3, &(0x7f0000001940)=""/34, 0x22}, 0x2}, {{&(0x7f0000001980)=@isdn, 0x80, &(0x7f0000002180)=[{&(0x7f0000001a00)=""/158, 0x9e}, {&(0x7f0000001ac0)=""/155, 0x9b}, {&(0x7f0000001b80)=""/133, 0x85}, {&(0x7f0000001c40)=""/136, 0x88}, {&(0x7f0000001d00)=""/253, 0xfd}, {&(0x7f0000001e00)=""/127, 0x7f}, {&(0x7f0000001e80)=""/132, 0x84}, {&(0x7f0000001f40)=""/200, 0xc8}, {&(0x7f0000002040)=""/87, 0x57}, {&(0x7f00000020c0)=""/139, 0x8b}], 0xa}, 0x7}, {{&(0x7f0000002240)=@nl=@proc, 0x80, &(0x7f0000003800)=[{&(0x7f00000022c0)=""/169, 0xa9}, {&(0x7f0000002380)=""/183, 0xb7}, {&(0x7f0000002440)=""/215, 0xd7}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/208, 0xd0}, {&(0x7f0000003640)=""/67, 0x43}, {&(0x7f00000036c0)=""/235, 0xeb}, {&(0x7f00000037c0)=""/33, 0x21}], 0x8, &(0x7f0000003880)=""/85, 0x55}, 0x10000}, {{&(0x7f0000003900)=@nl=@unspec, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003980)=""/6, 0x6}, {&(0x7f00000039c0)=""/74, 0x4a}], 0x2, &(0x7f0000003a80)=""/107, 0x6b}, 0x1}, {{&(0x7f0000003b00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003b80)=""/25, 0x19}, {&(0x7f0000003bc0)}, {&(0x7f0000003c00)=""/166, 0xa6}, {&(0x7f0000003cc0)=""/110, 0x6e}, {&(0x7f0000003d40)=""/12, 0xc}, {&(0x7f0000003d80)=""/7, 0x7}, {&(0x7f0000003dc0)=""/211, 0xd3}], 0x7, &(0x7f0000003f40)=""/96, 0x60}, 0x9}, {{0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000003fc0)=""/233, 0xe9}, {&(0x7f00000040c0)=""/19, 0x13}, {&(0x7f0000004100)=""/15, 0xf}, {&(0x7f0000004140)=""/101, 0x65}, {&(0x7f00000041c0)=""/9, 0x9}], 0x5, &(0x7f0000004280)=""/86, 0x56}, 0x1}], 0xa, 0x40000040, &(0x7f0000004580)={0x77359400}) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f00000001c0)={0x3, @default, r2}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x100, 0x30}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r4, 0x100000000, 0x4}, 0x8) [ 2123.226059][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:10 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) 17:19:10 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x8000, 0x4) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x29806c5fa86ed4a, 0x1, 0x0, 0xffffffffffffff06) shutdown(r0, 0x1) r1 = accept4(r0, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x80, 0x800) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000001c0)=0x7ff, 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) 17:19:10 executing program 1 (fault-call:9 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2123.549566][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2123.570063][T26058] FAULT_INJECTION: forcing a failure. [ 2123.570063][T26058] name failslab, interval 1, probability 0, space 0, times 0 [ 2123.614280][T26058] CPU: 1 PID: 26058 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2123.621880][T26058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2123.631949][T26058] Call Trace: [ 2123.635266][T26058] dump_stack+0x172/0x1f0 [ 2123.639636][T26058] should_fail.cold+0xa/0x15 [ 2123.644295][T26058] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2123.650231][T26058] ? ___might_sleep+0x163/0x280 [ 2123.655098][T26058] __should_failslab+0x121/0x190 [ 2123.655162][T26058] should_failslab+0x9/0x14 [ 2123.655177][T26058] __kmalloc+0x2dc/0x740 [ 2123.655202][T26058] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2123.674260][T26058] ? lock_sock_nested+0x9a/0x120 [ 2123.679212][T26058] ? trace_hardirqs_on+0x67/0x230 [ 2123.684254][T26058] ? tls_get_rec+0x104/0x590 [ 2123.688859][T26058] tls_get_rec+0x104/0x590 [ 2123.693292][T26058] ? lock_sock_nested+0xe2/0x120 [ 2123.698256][T26058] tls_sw_sendmsg+0xda5/0x17b0 [ 2123.703043][T26058] ? ___might_sleep+0x163/0x280 [ 2123.708012][T26058] ? tx_work_handler+0xf0/0xf0 [ 2123.712822][T26058] ? aa_sk_perm+0x288/0x880 [ 2123.717347][T26058] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2123.722918][T26058] inet_sendmsg+0x147/0x5e0 [ 2123.727442][T26058] ? ipip_gro_receive+0x100/0x100 [ 2123.732580][T26058] sock_sendmsg+0xf2/0x170 [ 2123.737031][T26058] __sys_sendto+0x262/0x380 [ 2123.741650][T26058] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2123.747054][T26058] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2123.752659][T26058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2123.758919][T26058] ? fput_many+0x12c/0x1a0 [ 2123.763354][T26058] ? fput+0x1b/0x20 [ 2123.767181][T26058] ? ksys_write+0x1cf/0x290 [ 2123.771707][T26058] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2123.777197][T26058] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2123.782838][T26058] ? do_syscall_64+0x26/0x680 [ 2123.787524][T26058] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.793626][T26058] __x64_sys_sendto+0xe1/0x1a0 [ 2123.793648][T26058] do_syscall_64+0x103/0x680 [ 2123.793669][T26058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2123.793680][T26058] RIP: 0033:0x458da9 [ 2123.793701][T26058] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2123.803042][T26058] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2123.803056][T26058] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2123.803063][T26058] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2123.803071][T26058] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2123.803078][T26058] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2123.803085][T26058] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2123.882535][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2123.888408][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:19:11 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r0, 0x0) socketpair(0x1, 0x0, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @bcast}, [@rose, @bcast, @null, @null, @default, @bcast, @netrom, @rose]}, &(0x7f00000000c0)=0x48) accept(r0, 0x0, 0x0) 17:19:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:11 executing program 5: socketpair(0x5, 0x80f, 0x401, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000140)=0x5) syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="33165f13e657", @local, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x4, 0x0, @link_local, "1ab04fe3", @remote, "3ce5d7e9adc993ff97b8a2301177db16"}}}}, 0x0) shutdown(r0, 0x0) 17:19:11 executing program 4: r0 = socket$inet(0x10, 0x400000003, 0xc) socket$inet(0x2, 0x7, 0xfffffffffffffffc) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x501, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x1c}}, 0x4000840) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000180)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000090a43ba5d806055b6fdd80b40000000030001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 17:19:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="6f0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:11 executing program 1 (fault-call:9 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:11 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x20000000000101}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) setsockopt$sock_int(r2, 0x1, 0x33, &(0x7f0000000000)=0x6, 0x4) sendmsg$nl_xfrm(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000d40)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@policy_type={0xc, 0x10, {0x1}}]}, 0xc4}}, 0x0) [ 2124.311461][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2124.326831][T26085] FAULT_INJECTION: forcing a failure. [ 2124.326831][T26085] name failslab, interval 1, probability 0, space 0, times 0 [ 2124.343050][T26085] CPU: 0 PID: 26085 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2124.351224][T26085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2124.361288][T26087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2124.361555][T26085] Call Trace: [ 2124.374175][T26085] dump_stack+0x172/0x1f0 [ 2124.378524][T26085] should_fail.cold+0xa/0x15 [ 2124.383135][T26085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2124.388957][T26085] ? ___might_sleep+0x163/0x280 [ 2124.393835][T26085] __should_failslab+0x121/0x190 [ 2124.398788][T26085] should_failslab+0x9/0x14 [ 2124.403314][T26085] __kmalloc+0x2dc/0x740 [ 2124.407567][T26085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2124.413847][T26085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2124.420104][T26085] ? tls_get_rec+0x104/0x590 [ 2124.424714][T26085] tls_get_rec+0x104/0x590 [ 2124.429152][T26085] tls_sw_sendmsg+0xda5/0x17b0 [ 2124.433959][T26085] ? tx_work_handler+0xf0/0xf0 [ 2124.438741][T26085] ? aa_sk_perm+0x288/0x880 [ 2124.443268][T26085] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2124.448838][T26085] inet_sendmsg+0x147/0x5e0 [ 2124.453361][T26085] ? ipip_gro_receive+0x100/0x100 17:19:11 executing program 5: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000100)=0x800, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3b, &(0x7f0000000000), &(0x7f00000000c0)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) [ 2124.458403][T26085] sock_sendmsg+0xf2/0x170 [ 2124.462840][T26085] __sys_sendto+0x262/0x380 [ 2124.467359][T26085] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2124.472753][T26085] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2124.478339][T26085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2124.484602][T26085] ? fput_many+0x12c/0x1a0 [ 2124.489064][T26085] ? fput+0x1b/0x20 [ 2124.492883][T26085] ? ksys_write+0x1cf/0x290 [ 2124.497408][T26085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2124.502884][T26085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2124.508364][T26085] ? do_syscall_64+0x26/0x680 [ 2124.513060][T26085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2124.519167][T26085] __x64_sys_sendto+0xe1/0x1a0 [ 2124.523955][T26085] do_syscall_64+0x103/0x680 [ 2124.528570][T26085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2124.534488][T26085] RIP: 0033:0x458da9 [ 2124.538423][T26085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:19:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000002d40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002b40)=[{{&(0x7f0000000000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)=""/11, 0xb}, {&(0x7f00000000c0)=""/217, 0xd9}, {&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/41, 0x29}], 0x6, &(0x7f00000013c0)=""/76, 0x4c}, 0xfffffffffffffffb}, {{&(0x7f0000001440)=@generic, 0x80, &(0x7f0000001740)=[{&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)}, {&(0x7f0000001580)}, {&(0x7f00000015c0)=""/69, 0x45}, {&(0x7f0000001640)=""/241, 0xf1}], 0x5, &(0x7f00000017c0)=""/225, 0xe1}, 0xa6f}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/243, 0xf3}], 0x1, &(0x7f0000001a00)=""/98, 0x62}, 0x3ff}, {{&(0x7f0000001a80)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b00)=""/156, 0x9c}, {&(0x7f0000001bc0)=""/165, 0xa5}, {&(0x7f0000001c80)=""/217, 0xd9}, {&(0x7f0000001d80)=""/14, 0xe}], 0x4, &(0x7f0000001e00)=""/10, 0xa}, 0x1}, {{&(0x7f0000001e40)=@sco, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/124, 0x7c}, {&(0x7f0000001f40)=""/7, 0x7}, {&(0x7f0000001f80)=""/229, 0xe5}], 0x3, &(0x7f00000020c0)=""/156, 0x9c}, 0x800}, {{&(0x7f0000002180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002200)=""/16, 0x10}], 0x1, &(0x7f0000002280)=""/191, 0xbf}, 0x9}, {{&(0x7f0000002340)=@ipx, 0x80, &(0x7f0000002400)=[{&(0x7f00000023c0)=""/14, 0xe}], 0x1, &(0x7f0000002440)=""/185, 0xb9}, 0x9}, {{&(0x7f0000002500)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002580)=""/44, 0x2c}, {&(0x7f00000025c0)=""/140, 0x8c}, {&(0x7f0000002680)=""/219, 0xdb}, {&(0x7f0000002780)=""/176, 0xb0}, {&(0x7f0000002840)=""/178, 0xb2}, {&(0x7f0000002900)=""/99, 0x63}, {&(0x7f0000002980)=""/97, 0x61}, {&(0x7f0000002a00)}], 0x8, &(0x7f0000002ac0)=""/105, 0x69}, 0x6}], 0x8, 0x40002102, &(0x7f0000002d80)={r1, r2+30000000}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000002dc0)={0x0, 0x6, 0x9b, 0x40, 0x2ac0000000000000, 0xff, 0xec, 0x7a00000000000000, {0x0, @in={{0x2, 0x4e22, @remote}}, 0x9, 0x8000, 0x7fffffff, 0x800, 0x10000}}, &(0x7f0000002e80)=0xb0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000002ec0)={r4, 0x10000}, &(0x7f0000002f00)=0x8) mmap(&(0x7f00002d8000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000012c0)={r5, 0x6}, 0xc) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 17:19:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2124.558130][T26085] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2124.566563][T26085] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2124.574569][T26085] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2124.582768][T26085] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2124.590762][T26085] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2124.598754][T26085] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @local}, 0x10) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") clock_gettime(0xfffffffffffffff8, &(0x7f0000000500)) [ 2124.723031][T26087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 17:19:12 executing program 1 (fault-call:9 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:12 executing program 4: r0 = socket$inet(0x10, 0x400000003, 0xc) socket$inet(0x2, 0x7, 0xfffffffffffffffc) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x501, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x1c}}, 0x4000840) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000180)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000090a43ba5d806055b6fdd80b40000000030001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 17:19:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2125.013377][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2125.029262][T26114] FAULT_INJECTION: forcing a failure. [ 2125.029262][T26114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2125.045904][T26114] CPU: 0 PID: 26114 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2125.053506][T26114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2125.063664][T26114] Call Trace: [ 2125.066981][T26114] dump_stack+0x172/0x1f0 [ 2125.071330][T26114] should_fail.cold+0xa/0x15 [ 2125.075940][T26114] ? __sys_sendto+0x262/0x380 [ 2125.075963][T26114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2125.075996][T26114] should_fail_alloc_page+0x50/0x60 [ 2125.076015][T26114] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2125.076036][T26114] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2125.076057][T26114] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2125.076073][T26114] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2125.076103][T26114] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2125.101183][T26120] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2125.102957][T26114] alloc_pages_current+0x107/0x210 [ 2125.102982][T26114] skb_page_frag_refill+0x277/0x460 [ 2125.102999][T26114] sk_page_frag_refill+0x55/0x1f0 [ 2125.103068][T26114] sk_msg_alloc+0x10e/0x8d0 [ 2125.103097][T26114] tls_sw_sendmsg+0x63c/0x17b0 [ 2125.103140][T26114] ? tx_work_handler+0xf0/0xf0 [ 2125.160116][T26114] ? aa_sk_perm+0x288/0x880 [ 2125.164658][T26114] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2125.170225][T26114] inet_sendmsg+0x147/0x5e0 [ 2125.174838][T26114] ? ipip_gro_receive+0x100/0x100 [ 2125.180149][T26114] sock_sendmsg+0xf2/0x170 [ 2125.184599][T26114] __sys_sendto+0x262/0x380 [ 2125.189415][T26114] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2125.194905][T26114] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2125.200493][T26114] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2125.206755][T26114] ? fput_many+0x12c/0x1a0 [ 2125.211719][T26114] ? fput+0x1b/0x20 [ 2125.215551][T26114] ? ksys_write+0x1cf/0x290 [ 2125.220091][T26114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2125.225569][T26114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2125.231057][T26114] ? do_syscall_64+0x26/0x680 [ 2125.235764][T26114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2125.241856][T26114] __x64_sys_sendto+0xe1/0x1a0 [ 2125.246674][T26114] do_syscall_64+0x103/0x680 [ 2125.251292][T26114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2125.257281][T26114] RIP: 0033:0x458da9 [ 2125.257304][T26114] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2125.280923][T26114] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2125.280940][T26114] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2125.280948][T26114] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2125.280955][T26114] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2125.280962][T26114] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2125.280969][T26114] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="700200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:13 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000ac0)='\x00'/11) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a00)='IPVS\x00') r1 = accept4(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000007c0)=0x80, 0x800) getsockname$netlink(r1, &(0x7f0000000800), &(0x7f0000000600)=0xfffffd4e) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r2, 0xa) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000000400)=0x800, 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 17:19:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="a389f4df89ac5daa0944e73168ffb5f113a3eedb6ba3731aafd6baafdef774b7aa7ade0d5707d3921bac54773a560d7a932bf75d1f9c8a467586d11855f1165951a0e3869ffc47a124b7452cf6c0927c682c9b57ebbd607f184c60ba8c4c05d6b1a79a97b3b3e7e4904eac806100568888986d17d37d89a4270136bd84db2cfae5739ff0cbdc4b554262acb9b6c09816b0854c6c"], 0x8) sendmmsg(r1, &(0x7f00000000c0), 0x40000000000005c, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$inet6_opts(r1, 0x29, 0x36, 0x0, &(0x7f0000000180)) 17:19:13 executing program 1 (fault-call:9 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)={0x54, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast2=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x54}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2aa) sendmmsg(r3, &(0x7f000000df00)=[{{&(0x7f00000000c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x3}}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x10}], 0x111}}], 0x1, 0x0) 17:19:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000003d40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=[@assoc={0x18, 0x29, 0x3}], 0x18}], 0x773, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x5, 0xb, 0x10001, 0x3}, &(0x7f0000000280)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0xe53a}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f0000000100)=""/186, 0xba, r2}}, 0x10) [ 2125.854884][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2125.876499][T26137] FAULT_INJECTION: forcing a failure. [ 2125.876499][T26137] name failslab, interval 1, probability 0, space 0, times 0 [ 2125.921275][T26137] CPU: 1 PID: 26137 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2125.928868][T26137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2125.938940][T26137] Call Trace: [ 2125.942255][T26137] dump_stack+0x172/0x1f0 [ 2125.946875][T26137] should_fail.cold+0xa/0x15 [ 2125.951477][T26137] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2125.957401][T26137] ? ___might_sleep+0x163/0x280 [ 2125.962279][T26137] __should_failslab+0x121/0x190 [ 2125.967243][T26137] should_failslab+0x9/0x14 [ 2125.971768][T26137] kmem_cache_alloc_node+0x264/0x710 [ 2125.977076][T26137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.983348][T26137] ? tcp_established_options+0x29d/0x4d0 [ 2125.989011][T26137] __alloc_skb+0xd5/0x5e0 [ 2125.993367][T26137] ? skb_trim+0x190/0x190 [ 2125.997733][T26137] sk_stream_alloc_skb+0x326/0xd80 [ 2126.002874][T26137] do_tcp_sendpages+0xafa/0x1b70 [ 2126.007834][T26137] ? debug_check_no_obj_freed+0x200/0x464 [ 2126.013587][T26137] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2126.018910][T26137] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2126.024750][T26137] tls_push_sg+0x1de/0x680 [ 2126.029398][T26137] tls_tx_records+0x3c8/0x760 [ 2126.034104][T26137] tls_push_record+0x1f67/0x3580 [ 2126.039181][T26137] ? tls_tx_records+0x760/0x760 [ 2126.044051][T26137] ? lock_downgrade+0x880/0x880 [ 2126.048916][T26137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.055174][T26137] ? kasan_check_read+0x11/0x20 [ 2126.060045][T26137] bpf_exec_tx_verdict+0xe30/0x1280 [ 2126.065372][T26137] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2126.071131][T26137] ? tls_push_record+0x3580/0x3580 [ 2126.076361][T26137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2126.082625][T26137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2126.088876][T26137] ? sk_msg_alloc+0x62d/0x8d0 [ 2126.093576][T26137] tls_sw_sendmsg+0x107c/0x17b0 [ 2126.098471][T26137] ? tx_work_handler+0xf0/0xf0 [ 2126.103279][T26137] ? aa_sk_perm+0x288/0x880 [ 2126.107801][T26137] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2126.113376][T26137] inet_sendmsg+0x147/0x5e0 [ 2126.117889][T26137] ? ipip_gro_receive+0x100/0x100 [ 2126.122929][T26137] sock_sendmsg+0xf2/0x170 [ 2126.127360][T26137] __sys_sendto+0x262/0x380 [ 2126.131887][T26137] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2126.137273][T26137] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2126.142849][T26137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2126.149103][T26137] ? fput_many+0x12c/0x1a0 [ 2126.153537][T26137] ? fput+0x1b/0x20 [ 2126.157437][T26137] ? ksys_write+0x1cf/0x290 [ 2126.161952][T26137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2126.167424][T26137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2126.172893][T26137] ? do_syscall_64+0x26/0x680 [ 2126.177587][T26137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2126.183685][T26137] __x64_sys_sendto+0xe1/0x1a0 [ 2126.188466][T26137] do_syscall_64+0x103/0x680 [ 2126.193090][T26137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2126.198996][T26137] RIP: 0033:0x458da9 [ 2126.202921][T26137] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:19:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth1\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0x3, 0x4) recvmsg(r0, &(0x7f0000001600)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000300)=""/186, 0xba}, {&(0x7f00000003c0)=""/112, 0x70}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000280)=""/13, 0xd}, {&(0x7f0000001440)=""/136, 0x88}, {&(0x7f0000001500)=""/56, 0x38}, {&(0x7f0000001540)=""/56, 0x38}], 0x7}, 0x40000000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000017c0)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001780)={&(0x7f00000016c0)={0xc0, r2, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb62}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb78}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x46dd}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000010}, 0x801) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x20, 0x4) sendto(r0, &(0x7f00000002c0)='$', 0x1, 0x0, 0x0, 0x0) 17:19:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newae={0x264, 0x1e, 0x701, 0x70bd26, 0x25dfdbff, {{@in=@multicast1, 0x4d4, 0xa}, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}, [@algo_crypt={0xe8, 0x2, {{'ecb-serpent-avx\x00'}, 0x4f0, "002eb4876e08955f44dbba2248c408e661068e8f6f4fb4b6096cc5cb923a4c4608e5cc037bf0af7b0bc1e1f3399dd89a3a785f5c6967a792250008d623b7cbfb7360a05ddd384701ac136447cd046539f25ec82726443ca92cc386af014eb1a332c53109004860456c8bdea8533505a87a4a472fa3653d5ba2956cb5c97d0648b27c60a637ab2dff692d062058128f93b1e18904962baf69c18ff981ea80"}}, @srcaddr={0x14, 0xd, @in6=@ipv4={[], [], @local}}, @proto={0x8, 0x19, 0x2b}, @etimer_thresh={0x8, 0xc, 0x9}, @policy_type={0xc, 0x10, {0x1}}, @algo_auth_trunc={0xe8, 0x14, {{'cbcmac(twofish-generic)\x00'}, 0x4d8, 0x380, "b70cb357c522ad11a173ba7b6d01bab4a6b5b30d708b8a2bb18c31da8d8b44a5a32417d67605cc287cba7c2ec5a8434a744dae20f66ee38ae8562943efbf3ed1d3ecd5595317d0e2c61336e5af21db05f6e5bc4ca15cfdbde53ecc5ec84d27c174a97f346684c36b239dbe273ce26fa57dc7cac9889ec715f7615fc7357cae3e98051a2c252d4f70e89c4132d21b497fc1f51e44df002414f91545"}}, @ipv6_hthresh={0x8, 0x4, {0x1c, 0xd}}, @ipv4_hthresh={0x8, 0x3, {0x1e, 0x16}}, @mark={0xc, 0x15, {0x350759, 0x8}}, @output_mark={0x8, 0x1d, 0x6}]}, 0x264}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000240)={0x9, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) [ 2126.222635][T26137] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2126.231056][T26137] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2126.239044][T26137] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2126.239983][T26154] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 2126.247027][T26137] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2126.247036][T26137] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2900000018001900003fcdffffffda0602007a00fde8ff00084000040d0005000005000000060000ff", 0x29}], 0x1) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x8001, 0xa, 0x9, 0x8, r2}, &(0x7f0000000140)=0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="f143484cf6ba703f7fb733fec8e2ed40cd0c1aae1bb8d2bb880104a6e0", @ANYRES16=r3, @ANYBLOB="01082bbd7000fbdbdf25040000000400040008000300040000000800020008000000080006000400000018000400e8b7000007000000450d00000100000009000000"], 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x20040880) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") [ 2126.247044][T26137] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2126.332079][T26159] vcan0: MTU too low for tipc bearer [ 2126.441405][T26159] Enabling of bearer rejected, failed to enable media [ 2126.461613][T26154] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 2126.478761][T26165] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2126.660964][T26173] vcan0: MTU too low for tipc bearer [ 2126.673411][T26173] Enabling of bearer rejected, failed to enable media 17:19:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="710200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:14 executing program 1 (fault-call:9 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:14 executing program 4: unshare(0x40000000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040)=0x7, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8000008031, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) 17:19:14 executing program 5: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r2 = accept(r0, 0x0, &(0x7f0000000080)) sendto$rxrpc(r2, &(0x7f00000000c0)="38655dc5f49af5a45d2ed3c2114cbd8f8720d98e9c42f311e63b73cf850285cede69ade5a69bac63dbb2cae420e19b2b3702df9fc63058bfeac7", 0x3a, 0x4000, &(0x7f0000000100)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @local, 0x100000000}}, 0x24) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@bcast) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f0000000140)="9d3fc5c7d4c410f4a592197c68c383264ed0ebfdea94d17fadf2c1999385eeac00"/54) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x3) 17:19:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000000080)={0x0, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r2, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xee5, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x9, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f0000000100)={0x200000003, 0x5, 0xb, 0x100000000013}, &(0x7f0000000140)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x9}}, 0x10) [ 2127.081998][T26185] IPVS: ftp: loaded support on port[0] = 21 [ 2127.091376][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2127.106349][T26184] FAULT_INJECTION: forcing a failure. [ 2127.106349][T26184] name failslab, interval 1, probability 0, space 0, times 0 17:19:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2127.132127][T26184] CPU: 0 PID: 26184 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2127.139737][T26184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2127.139745][T26184] Call Trace: [ 2127.139773][T26184] dump_stack+0x172/0x1f0 [ 2127.139806][T26184] should_fail.cold+0xa/0x15 [ 2127.162109][T26184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2127.167952][T26184] ? ___might_sleep+0x163/0x280 [ 2127.167975][T26184] __should_failslab+0x121/0x190 [ 2127.167997][T26184] should_failslab+0x9/0x14 [ 2127.182495][T26184] kmem_cache_alloc_node_trace+0x270/0x720 [ 2127.188609][T26184] __kmalloc_node_track_caller+0x3d/0x70 [ 2127.188638][T26184] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2127.188665][T26184] __alloc_skb+0x10b/0x5e0 [ 2127.204116][T26184] ? skb_trim+0x190/0x190 [ 2127.208479][T26184] sk_stream_alloc_skb+0x326/0xd80 [ 2127.208501][T26184] do_tcp_sendpages+0xafa/0x1b70 [ 2127.208527][T26184] ? debug_check_no_obj_freed+0x200/0x464 [ 2127.224346][T26184] ? sk_stream_alloc_skb+0xd80/0xd80 17:19:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2127.224371][T26184] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2127.224389][T26184] tls_push_sg+0x1de/0x680 [ 2127.224415][T26184] tls_tx_records+0x3c8/0x760 [ 2127.224435][T26184] tls_push_record+0x1f67/0x3580 [ 2127.224476][T26184] ? tls_tx_records+0x760/0x760 [ 2127.235505][T26184] ? lock_downgrade+0x880/0x880 [ 2127.235522][T26184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.235542][T26184] ? kasan_check_read+0x11/0x20 [ 2127.249649][T26184] bpf_exec_tx_verdict+0xe30/0x1280 [ 2127.249676][T26184] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2127.249696][T26184] ? tls_push_record+0x3580/0x3580 [ 2127.265756][T26184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2127.275814][T26184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.275832][T26184] ? sk_msg_alloc+0x62d/0x8d0 [ 2127.275857][T26184] tls_sw_sendmsg+0x107c/0x17b0 [ 2127.286803][T26184] ? tx_work_handler+0xf0/0xf0 [ 2127.313560][T26184] ? aa_sk_perm+0x288/0x880 [ 2127.313586][T26184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2127.313627][T26184] inet_sendmsg+0x147/0x5e0 [ 2127.313642][T26184] ? ipip_gro_receive+0x100/0x100 [ 2127.313661][T26184] sock_sendmsg+0xf2/0x170 [ 2127.313678][T26184] __sys_sendto+0x262/0x380 [ 2127.313696][T26184] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2127.313715][T26184] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2127.313745][T26184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2127.313759][T26184] ? fput_many+0x12c/0x1a0 [ 2127.313774][T26184] ? fput+0x1b/0x20 [ 2127.313787][T26184] ? ksys_write+0x1cf/0x290 [ 2127.313807][T26184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2127.313829][T26184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2127.323910][T26184] ? do_syscall_64+0x26/0x680 [ 2127.333538][T26184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.333565][T26184] __x64_sys_sendto+0xe1/0x1a0 [ 2127.333586][T26184] do_syscall_64+0x103/0x680 [ 2127.333623][T26184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.333635][T26184] RIP: 0033:0x458da9 [ 2127.333650][T26184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2127.333665][T26184] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2127.342583][T26184] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2127.342603][T26184] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2127.342618][T26184] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2127.342627][T26184] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2127.342635][T26184] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:14 executing program 1 (fault-call:9 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$inet_sctp(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000580)="c0", 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x8, @rand_addr="dc069d1fe04df6569c9eee7dcd23a56a", 0x10001}}}, 0x84) r2 = accept4(r1, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x80, 0x80000) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x3ff}, {0xa, 0x4e21, 0x14, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x81, [0xee, 0xfffffffffffffff7, 0x2, 0x3, 0x10000, 0x1, 0x5, 0xfffffffffffff154]}, 0x5c) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) 17:19:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2127.664262][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2127.759520][T26201] FAULT_INJECTION: forcing a failure. [ 2127.759520][T26201] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.775567][T26201] CPU: 1 PID: 26201 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2127.783277][T26201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2127.793374][T26201] Call Trace: [ 2127.796700][T26201] dump_stack+0x172/0x1f0 [ 2127.801084][T26201] should_fail.cold+0xa/0x15 [ 2127.805740][T26201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2127.811575][T26201] ? ___might_sleep+0x163/0x280 [ 2127.816464][T26201] __should_failslab+0x121/0x190 [ 2127.821425][T26201] should_failslab+0x9/0x14 [ 2127.826391][T26201] __kmalloc+0x2dc/0x740 [ 2127.830661][T26201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2127.836929][T26201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2127.843198][T26201] ? tls_get_rec+0x104/0x590 [ 2127.847814][T26201] tls_get_rec+0x104/0x590 [ 2127.852262][T26201] tls_sw_sendmsg+0xda5/0x17b0 [ 2127.857077][T26201] ? tx_work_handler+0xf0/0xf0 [ 2127.861875][T26201] ? aa_sk_perm+0x288/0x880 [ 2127.866500][T26201] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2127.872078][T26201] inet_sendmsg+0x147/0x5e0 [ 2127.876629][T26201] ? ipip_gro_receive+0x100/0x100 [ 2127.881687][T26201] sock_sendmsg+0xf2/0x170 [ 2127.886142][T26201] __sys_sendto+0x262/0x380 [ 2127.890676][T26201] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2127.896074][T26201] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2127.901662][T26201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2127.907932][T26201] ? fput_many+0x12c/0x1a0 [ 2127.912375][T26201] ? fput+0x1b/0x20 [ 2127.916207][T26201] ? ksys_write+0x1cf/0x290 [ 2127.920741][T26201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2127.926229][T26201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2127.931720][T26201] ? do_syscall_64+0x26/0x680 [ 2127.936527][T26201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.942628][T26201] __x64_sys_sendto+0xe1/0x1a0 [ 2127.947428][T26201] do_syscall_64+0x103/0x680 [ 2127.952054][T26201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2127.957978][T26201] RIP: 0033:0x458da9 [ 2127.961898][T26201] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2127.981609][T26201] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2127.990039][T26201] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2127.998151][T26201] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2128.006144][T26201] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2128.014134][T26201] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2128.022141][T26201] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bcsf0\x00', {0x2, 0x4e22, @multicast1}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='M\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="09020000000000000000100000000c0001000800010000000000"], 0x20}}, 0x0) write$binfmt_aout(r1, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0x1320) 17:19:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x20000000000036, 0x11d, 0x0, 0x0, {0x1}, [@generic="ffd38d9b", @nested={0x4, 0x1}]}, 0x1c}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000080)=0x3ff, 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) recvfrom$x25(r2, &(0x7f0000000140)=""/162, 0xa2, 0x40, &(0x7f0000000240)={0x9, @null=' \x00'}, 0x12) 17:19:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="720200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:15 executing program 1 (fault-call:9 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x4, 0x4, 0x7cb, 0x0, 0xffffffffffffff9c}, 0x2c) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'dummy0\x00', 0x0}) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0, 0x0, [], r0}, 0x3c) [ 2128.536204][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2128.580796][T26224] FAULT_INJECTION: forcing a failure. [ 2128.580796][T26224] name failslab, interval 1, probability 0, space 0, times 0 [ 2128.622478][T26224] CPU: 1 PID: 26224 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2128.630078][T26224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2128.640162][T26224] Call Trace: [ 2128.643474][T26224] dump_stack+0x172/0x1f0 [ 2128.647924][T26224] should_fail.cold+0xa/0x15 [ 2128.652538][T26224] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2128.658367][T26224] ? ___might_sleep+0x163/0x280 [ 2128.663249][T26224] __should_failslab+0x121/0x190 [ 2128.668214][T26224] should_failslab+0x9/0x14 [ 2128.672755][T26224] __kmalloc+0x2dc/0x740 [ 2128.677014][T26224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2128.683266][T26224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2128.689514][T26224] ? tls_get_rec+0x104/0x590 [ 2128.694138][T26224] tls_get_rec+0x104/0x590 [ 2128.698583][T26224] tls_sw_sendmsg+0xda5/0x17b0 [ 2128.703395][T26224] ? tx_work_handler+0xf0/0xf0 [ 2128.708247][T26224] ? aa_sk_perm+0x288/0x880 [ 2128.712776][T26224] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2128.718352][T26224] inet_sendmsg+0x147/0x5e0 [ 2128.722872][T26224] ? ipip_gro_receive+0x100/0x100 [ 2128.727921][T26224] sock_sendmsg+0xf2/0x170 [ 2128.732362][T26224] __sys_sendto+0x262/0x380 [ 2128.736883][T26224] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2128.742270][T26224] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2128.747850][T26224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2128.754104][T26224] ? fput_many+0x12c/0x1a0 [ 2128.758546][T26224] ? fput+0x1b/0x20 [ 2128.762365][T26224] ? ksys_write+0x1cf/0x290 [ 2128.766886][T26224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2128.772390][T26224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2128.777964][T26224] ? do_syscall_64+0x26/0x680 [ 2128.782665][T26224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.788789][T26224] __x64_sys_sendto+0xe1/0x1a0 [ 2128.793672][T26224] do_syscall_64+0x103/0x680 [ 2128.798327][T26224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2128.804238][T26224] RIP: 0033:0x458da9 17:19:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0x5) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x44, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x44}}, 0x0) [ 2128.808148][T26224] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2128.827940][T26224] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2128.836370][T26224] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2128.844360][T26224] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2128.852365][T26224] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2128.852374][T26224] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2128.852382][T26224] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:16 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2128.917742][T26242] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 17:19:16 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000140)=0xad, 0x33c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) socket$inet(0x2, 0x800, 0x2) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x408, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x756}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x1}, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x363) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 17:19:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000001701000091e663426f0eb5ae28091538"], 0x18}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={r0}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000500)=""/117, 0x75}, {&(0x7f0000000580)=""/74, 0x4a}, {&(0x7f0000000600)=""/218, 0xda}], 0x3, &(0x7f0000000740)=""/150, 0x96}, 0x101) accept(r0, 0x0, &(0x7f0000000840)) pipe(&(0x7f0000001a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000003c00)={r0}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0xb0, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f0000000140)=""/176}, &(0x7f0000000200)=0x78) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 17:19:16 executing program 1 (fault-call:9 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:16 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) setsockopt$inet6_buf(r0, 0x29, 0x6f, &(0x7f0000000180)="df888577873dcb3bca12bc2d10aa79588cb1e868ac3b99bf04b97a0fa3603fec401e6fde3b8a5a08e9d512eba58b165c883f2d2a27a7051217fde473eccbe57b7d74cc582ce5233647719ff71875fb5bb80bcd46e70ce01a2d3dace2bfaa3383455e1397e6869892a105f1f57cc631365992b64e10f84f4d7b1e909b9fac434510f0008a5a6bc0c6eb7b8ff8f6fe3e9340a69bcdada56665cf50731af43726c0d9e6c4dc9bed4873c63ec94ceeb246d36dbee3d9507c700533a5feb869eb8e58956e8600425e2f44dc25177f5ec24bf7e5918e943546e2f0f269b8c2ee7014a40f904787f87f91179579d2", 0xeb) mmap(&(0x7f0000ee2000/0x4000)=nil, 0x4000, 0x1, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_data=&(0x7f0000000040)="061b537a6329457ed9d9d4ede5bf0363286c77e38763f8b0c391d62b5564a701"}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xcd, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, 0x5c) 17:19:16 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2129.257215][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2129.300826][T26260] FAULT_INJECTION: forcing a failure. [ 2129.300826][T26260] name failslab, interval 1, probability 0, space 0, times 0 [ 2129.400684][T26260] CPU: 0 PID: 26260 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2129.408309][T26260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2129.418518][T26260] Call Trace: [ 2129.421846][T26260] dump_stack+0x172/0x1f0 [ 2129.426218][T26260] should_fail.cold+0xa/0x15 [ 2129.430846][T26260] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2129.436688][T26260] ? ___might_sleep+0x163/0x280 [ 2129.441560][T26260] __should_failslab+0x121/0x190 [ 2129.446536][T26260] should_failslab+0x9/0x14 [ 2129.451067][T26260] kmem_cache_alloc_node_trace+0x270/0x720 [ 2129.456912][T26260] __kmalloc_node_track_caller+0x3d/0x70 [ 2129.462567][T26260] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2129.467982][T26260] __alloc_skb+0x10b/0x5e0 [ 2129.472424][T26260] ? skb_trim+0x190/0x190 [ 2129.476875][T26260] sk_stream_alloc_skb+0x326/0xd80 [ 2129.483632][T26260] do_tcp_sendpages+0xafa/0x1b70 [ 2129.488635][T26260] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2129.493968][T26260] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2129.499721][T26260] tls_push_sg+0x1de/0x680 [ 2129.504224][T26260] tls_tx_records+0x3c8/0x760 [ 2129.508933][T26260] tls_push_record+0x1f67/0x3580 [ 2129.513920][T26260] ? tls_tx_records+0x760/0x760 [ 2129.518794][T26260] ? lock_downgrade+0x880/0x880 [ 2129.523664][T26260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2129.529923][T26260] ? kasan_check_read+0x11/0x20 [ 2129.534786][T26260] bpf_exec_tx_verdict+0xe30/0x1280 [ 2129.534809][T26260] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2129.534822][T26260] ? tls_push_record+0x3580/0x3580 [ 2129.534898][T26260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2129.534919][T26260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2129.563632][T26260] ? sk_msg_alloc+0x62d/0x8d0 [ 2129.568364][T26260] tls_sw_sendmsg+0x107c/0x17b0 [ 2129.573255][T26260] ? tx_work_handler+0xf0/0xf0 [ 2129.578047][T26260] ? aa_sk_perm+0x288/0x880 [ 2129.582578][T26260] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2129.588181][T26260] inet_sendmsg+0x147/0x5e0 [ 2129.592713][T26260] ? ipip_gro_receive+0x100/0x100 [ 2129.597764][T26260] sock_sendmsg+0xf2/0x170 [ 2129.602217][T26260] __sys_sendto+0x262/0x380 [ 2129.606740][T26260] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2129.612132][T26260] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2129.617725][T26260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2129.623998][T26260] ? fput_many+0x12c/0x1a0 [ 2129.628469][T26260] ? fput+0x1b/0x20 [ 2129.632295][T26260] ? ksys_write+0x1cf/0x290 [ 2129.636823][T26260] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2129.642293][T26260] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2129.647777][T26260] ? do_syscall_64+0x26/0x680 [ 2129.652476][T26260] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2129.658564][T26260] __x64_sys_sendto+0xe1/0x1a0 [ 2129.663371][T26260] do_syscall_64+0x103/0x680 [ 2129.668001][T26260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2129.673913][T26260] RIP: 0033:0x458da9 [ 2129.677869][T26260] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2129.697577][T26260] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2129.706027][T26260] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2129.714015][T26260] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2129.722003][T26260] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2129.729994][T26260] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2129.737990][T26260] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2129.746392][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.752212][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000080), 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x689}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x4, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000000000], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x2, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) 17:19:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="730200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:17 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:17 executing program 4: r0 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0x29b) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000580)=""/186, 0xba}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/121, 0x79}], 0x1, 0x0, 0xa9}}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000300)=' ', 0x1, 0x0, 0x0, 0x0) 17:19:17 executing program 1 (fault-call:9 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:17 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000440)) pipe(&(0x7f0000000480)={0xffffffffffffffff}) r1 = openat$cgroup(r0, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r2 = socket(0xa, 0x1, 0x400) recvfrom$unix(r2, &(0x7f0000000100)=""/134, 0x86, 0x10001, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgrou{.events\x00', 0xea02ffe0, 0x0) getsockopt$ax25_int(r2, 0x101, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) r4 = openat$cgroup_ro(r1, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) readv(r3, &(0x7f00000002c0)=[{0x0, 0x600}, {0x0, 0x20f}, {&(0x7f0000000200)=""/33, 0x7ffff000}], 0x3) accept$ax25(r4, 0x0, &(0x7f0000000380)) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000004c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r5, 0x21, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000001}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @broadcast}}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0xc0) 17:19:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept(r1, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)=0x7fffffff, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, 0x2a, 0x82d, 0x0, 0x0, {0x7}, [@nested={0x10, 0x8, [@typed={0xc, 0x0, @u64}]}]}, 0x24}}, 0x0) 17:19:17 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x1, 0x7, 0x1) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000000)={0x6, 'syz1\x00'}) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/168, 0xa8}], 0x1}}, @rdma_args={0x48, 0x114, 0x4, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) 17:19:18 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2130.675796][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2130.697565][T26293] FAULT_INJECTION: forcing a failure. [ 2130.697565][T26293] name failslab, interval 1, probability 0, space 0, times 0 [ 2130.763053][T26293] CPU: 0 PID: 26293 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2130.770672][T26293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2130.780754][T26293] Call Trace: [ 2130.784086][T26293] dump_stack+0x172/0x1f0 [ 2130.788453][T26293] should_fail.cold+0xa/0x15 [ 2130.793096][T26293] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2130.798941][T26293] ? ___might_sleep+0x163/0x280 [ 2130.803819][T26293] __should_failslab+0x121/0x190 [ 2130.808791][T26293] should_failslab+0x9/0x14 [ 2130.813320][T26293] __kmalloc+0x2dc/0x740 [ 2130.817602][T26293] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2130.823882][T26293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2130.830150][T26293] ? tls_get_rec+0x104/0x590 [ 2130.834773][T26293] tls_get_rec+0x104/0x590 [ 2130.839220][T26293] tls_sw_sendmsg+0xda5/0x17b0 [ 2130.844043][T26293] ? tx_work_handler+0xf0/0xf0 [ 2130.848834][T26293] ? aa_sk_perm+0x288/0x880 [ 2130.853368][T26293] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2130.858946][T26293] inet_sendmsg+0x147/0x5e0 [ 2130.863474][T26293] ? ipip_gro_receive+0x100/0x100 [ 2130.868523][T26293] sock_sendmsg+0xf2/0x170 [ 2130.872966][T26293] __sys_sendto+0x262/0x380 [ 2130.877500][T26293] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2130.882892][T26293] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2130.888471][T26293] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2130.894729][T26293] ? fput_many+0x12c/0x1a0 [ 2130.899172][T26293] ? fput+0x1b/0x20 [ 2130.902997][T26293] ? ksys_write+0x1cf/0x290 [ 2130.907527][T26293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2130.913022][T26293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2130.918518][T26293] ? do_syscall_64+0x26/0x680 [ 2130.923227][T26293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.929348][T26293] __x64_sys_sendto+0xe1/0x1a0 [ 2130.929371][T26293] do_syscall_64+0x103/0x680 [ 2130.929399][T26293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2130.944665][T26293] RIP: 0033:0x458da9 [ 2130.948587][T26293] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2130.968242][T26293] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2130.968258][T26293] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2130.968265][T26293] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2130.968272][T26293] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2130.968280][T26293] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x401) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe75, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x24}}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x19113a7e5833c6c5) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) accept(r0, &(0x7f0000000ec0)=@l2, &(0x7f0000000f40)=0x80) pipe(&(0x7f0000000f80)) socket(0x5, 0x6, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000fc0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = accept(r1, 0x0, &(0x7f0000005a00)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040)=0xfffffffffffffff9, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x0, 0x1f3) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x14050000000000) [ 2130.968288][T26293] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:18 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000002c0)=0x8) r2 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000140)={@multicast2, @remote}, &(0x7f0000000280)=0xc) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x100050, 0x0, 0x0, 0x9a}, {0x80000006}]}, 0x10) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000200)={{0x2, 0x4e21, @rand_addr=0x100000000}, {0x306, @local}, 0x0, {0x2, 0x4e23, @empty}, 'veth1_to_hsr\x00'}) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket(0x0, 0x0, 0x10001) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000006740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000006800)={&(0x7f0000006700)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000067c0)={&(0x7f0000006780)={0x30, r4, 0x0, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1486e3ca, 0x5, 0x2, 0x10000}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) r5 = socket$inet(0x2, 0x5, 0x3) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x67) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000300)) [ 2131.082394][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2131.088250][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2131.094139][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2131.099939][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:18 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="740200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0xcb) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000040)=0x9, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 17:19:19 executing program 1 (fault-call:9 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:19 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x3, 0x2, 0x2, 0x8, 0x7fffffff, 0xea}, 0x20) 17:19:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)="9a03eb64071ea87bcaad19fcf99d6dace5e9b0fe3570e04a049b157ce252f78316aff24b0afcdfa8c6da86bec4b3bf48118b5acf60b3242d9066a814874db46f4c7cc97e0ef5313d9a5422dd67fd8b2311a075d964acc7781c21608781fd1ce022cfa28e4dcb22db0b567034f798adc19d19f5be2ed12f1f", 0x78}, {&(0x7f0000000140)="e6644dc88c52e85f1e287519c612cecff5bbf0b7819589112d22c455f001f168b8eb22e1a91f7cce1a70b981072a020133354902b6ae67547ec4856f9d2af926be", 0x41}, {&(0x7f00000001c0)="98657edf1fea7c4fca16b3112b2c69917ab5e34abde0b0d2d01b48683697d5b49b516c419350df5846f874bdd023c03eec0c412d3381fa205344a9b35469c683af79a41d2f0203d843bd4aa5bb056f34268141c4d28c72a14de591cd83a237839d98eb66e9", 0x65}, {&(0x7f0000000240)}, {&(0x7f0000000280)="cb624f03bdecf1487da1ddad055fc167938b38390963f9bafa16dd966cf60f97da9b31d387267f2b2385a96d03d8a35d3f343dc2827635ee9f63783d39128cfaf4bb045924dfe60a1bd570841128a971f4e82d44769f20580c0b75f1b245d055fb19790096719280f6edc03e90ca886a6cdb1563902d8064a13bbe552de7bc54847ea7d42f448a291bf0e08ce85e68ab4fbe3dfd5cc633b9cb297b00be608c2b17e1ec6b6d1747bb8f0a39a26a8b9633cc09e21566b8b774453c", 0xba}, {&(0x7f0000000340)="59852fb4264b419d597df795cbb3e5d82ea3ae28f6236bf586cc782ce26b0a27cd3cc3dbc7c3c95e4bf197a6ecab43ed5722b1e6837d90a941f4bd9db120e034dc4dabc27da3fae397ab0f9d59c7cf1391f879100702c30959c45b22a1e65bc096261bd1fe8d4edf687d83548241bca28cd401d9a8f7614b22296b8f2aa352e8cd85bd59", 0x84}, {&(0x7f0000000400)="6e6760e5ecd5d359873eaea276d70dfbdd3a8ed85525d1502dd8032f2fb99bed8c872b7b276dbe9a1f42ac796983662d6fe3ed5bfe05e3f27c2b1fab48d4d8a087a1cdf63d05e885cd4a081ddb067bc4b552132db769bc0267f4b5d8df4756eabffae02877fafaab1fa551ce117c2eb4f7c0ffa7dab87f53697d59662988fa9a96fb41c9a268018e2a864aede8a0482ceabdd64c11068434ec0331a5e15e402622a3ee21f7f168daa751c7", 0xab}, {&(0x7f00000004c0)="e42961c4c9d1b69169fb0e040b34dc13ec0f0a5e243e7b7d62f3b05025b6e2595258953503eca3ee391f160b05b54933c841af169bf18ea39b07af053fd9703ac511fe590c9bb25686190060d67abdde182b87cd64ed3d1b9d449fcd5e5240fc6f54480652c6cf7eca131ca9f97904c5dacbe8ce820b7932d3d7b0ee3f96bb67f2a5518642259105032b902eda87149b57ee53ef0e10e0a872e7ca20885edf86965a17bd906c5ab64321985a44fdd8e0609fa39b5c2f0228edce2b1165aac00d8ccc8adf52ec34edebacf0effa4de78a7dc5258941f6959bf60f1df1e7c6413feb8ac7175fe30460be2f75e7dacf6b", 0xef}, {&(0x7f00000005c0)="7175e6f13df1926d9354ae81631f5b9ced555db94a73f1263a337ddf446d5a5240a97f59dbf034d386a538d73dbf2852c7c1d26a7bb4b7e74c357fdadc2d9af0b1122c98b756d3124db9b92eac6d9fbdc77c8fc7d4f9adc3d5ebc81ba13404235ceff0b2885d9a73712211bdfd3a6ec16c7b8b019f5dfbd2", 0x78}], 0x9) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f0000000e80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000a40)={0x3f8, 0x7, 0x2, 0x804, 0x70bd25, 0x25dfdbfb, {0xf}, [@generic="515a115b439d50df0b615f3759bf4e098a75d37d42e26d9623677a245a85ad875e3e9e3c8ac0157e5f9b8dec93c161b59d86b83cd355149c4e4a0a855d66e7", @typed={0x8, 0x50, @uid=r2}, @typed={0x34, 0x27, @str='(usernodevcpusetprocZ%eth0@nodeveth0security\x00'}, @nested={0x32c, 0x39, [@generic="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", @generic="760af7b5abea88a1347102d55af26e23055e0948eae640966241070992d6723702eb4d74bc1aff13f55a46b2290f1aa82d83bf4103d67d6a7d5689fccb4c8937565f49e3c915a870a6322ee7363870d439439663f76ec4e3784fc37373612b39da0a7a3f646d4e4c5a574a956edb49556314a44aabe1ac692aab36d2c5e15bc094315f827ba69f2c68406781beeeb5e44ad57cba1d2535cffe3b754c1a67509c33d395242b0b664251c97dc404204d9494232d17bb2f9b8a21d705dab8e9de60c192f8db1615bf5912b4cc08b98b1ac568ceb3fd185533050a9ca5e299bf74fdf427d49a7282827c3d66636d9e69c5530f40af864a21d978abd3d6", @generic="de65c311e473301adc3c061cc7727a2b36b902f40c4862ce322cfcae933f61e2e14edde3b8bfacd2910b03a08b4f428d9710f04a34b4b255c7af8e41b5a066552884641bb2ad0409645d57109fc1803cc1f5d01039127ef1284a8f85393462424dae473450", @generic="c784e4f8fe743880bf6926bf3326686d52134957ae4ce10d732441e371c362e5abd2e72ad372dea2997f857c9fbfdb0e6a3aaa1f71dd79efabb64d9d018b3803e2b0ac9571fc45df8f0441fa1c5c4436d25a30ec1e0458ff0a074657c31f26bbf674743bb03d22943d1447", @generic="3da54e65a6b3ff8e29903906553d605fb4e39d9994028c42ae9354ed9924587eb88746823ff750ecedb428353b09eb1395d3b3550a6439adaac5cd5f015b89a9527eca30d1b4160583b51e32efbc2bf4e5447154ad85c2a52cff986ae6ed9525c2c974"]}, @typed={0xc, 0x2a, @u64=0x1}, @typed={0x8, 0x4d, @ipv4=@empty}, @nested={0x28, 0x68, [@generic="b03a7f11aa667f3838ffc7c6e5fd07935dbc925a9326d066520d507c3abed0022a", @generic="914b"]}]}, 0x3f8}, 0x1, 0x0, 0x0, 0x10}, 0x8040) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000800)={0x68, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @multicast2}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x1d}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x32}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}]}, 0x68}, 0x1, 0x0, 0x0, 0x14}, 0x40091) 17:19:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2132.027862][T26343] FAULT_INJECTION: forcing a failure. [ 2132.027862][T26343] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2132.137666][T26343] CPU: 1 PID: 26343 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2132.145287][T26343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2132.155401][T26343] Call Trace: [ 2132.158713][T26343] dump_stack+0x172/0x1f0 [ 2132.163073][T26343] should_fail.cold+0xa/0x15 [ 2132.167713][T26343] ? __sys_sendto+0x262/0x380 [ 2132.167737][T26343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2132.178329][T26343] should_fail_alloc_page+0x50/0x60 [ 2132.178352][T26343] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2132.188971][T26343] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2132.194646][T26343] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2132.200390][T26343] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2132.206054][T26343] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2132.212424][T26343] alloc_pages_current+0x107/0x210 [ 2132.217562][T26343] skb_page_frag_refill+0x277/0x460 [ 2132.222810][T26343] sk_page_frag_refill+0x55/0x1f0 [ 2132.227885][T26343] sk_msg_alloc+0x10e/0x8d0 [ 2132.232435][T26343] tls_sw_sendmsg+0x63c/0x17b0 [ 2132.237251][T26343] ? tx_work_handler+0xf0/0xf0 [ 2132.242045][T26343] ? aa_sk_perm+0x288/0x880 [ 2132.246580][T26343] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2132.252174][T26343] inet_sendmsg+0x147/0x5e0 [ 2132.256794][T26343] ? ipip_gro_receive+0x100/0x100 [ 2132.261853][T26343] sock_sendmsg+0xf2/0x170 [ 2132.266304][T26343] __sys_sendto+0x262/0x380 [ 2132.270837][T26343] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2132.276329][T26343] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2132.281922][T26343] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2132.288803][T26343] ? fput_many+0x12c/0x1a0 [ 2132.293244][T26343] ? fput+0x1b/0x20 [ 2132.293258][T26343] ? ksys_write+0x1cf/0x290 [ 2132.293277][T26343] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2132.293291][T26343] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2132.293306][T26343] ? do_syscall_64+0x26/0x680 [ 2132.293324][T26343] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2132.293350][T26343] __x64_sys_sendto+0xe1/0x1a0 [ 2132.331157][T26343] do_syscall_64+0x103/0x680 [ 2132.336050][T26343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2132.341988][T26343] RIP: 0033:0x458da9 [ 2132.345903][T26343] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2132.365625][T26343] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2132.374075][T26343] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 17:19:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x2, &(0x7f00000000c0)=@raw=[@generic={0x2, 0xe256, 0x81, 0x10000, 0xc4}, @ldst={0x0, 0x1, 0x7, 0x6, 0xa, 0x9e, 0xfffffffffffffffc}], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x1d, &(0x7f0000000180)=""/29, 0x0, 0x1, [], r1, 0xd, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xf, 0x74c, 0x8000}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x30}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff52}, 0x48) 17:19:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x230, r3, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa0b3}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x12c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x9, @mcast1, 0xf897}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xfffffffffffff001, @dev={0xfe, 0x80, [], 0x15}, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0xffffffffffff7fff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x66ef, @mcast1, 0x80000001}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3, @local, 0x18}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'erspan0\x00'}}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x80}, 0x4094) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='!', 0x1}], 0x1, 0x0) 17:19:19 executing program 4: syz_genetlink_get_family_id$ipvs(0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4, 0x1000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r1, &(0x7f0000000000)=0xdb, 0xffffffffffffffed) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0xfffffffffffffc80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0x1f) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8, 0xe0ffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000200)=0x7, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000003c0)={r3, 0xcc, "7a94d4e1c77c4047872cbeb4c46d8dcf0317ba524a6bcf19f0ae73786f61a140da6779c23c9e3817ce531785612136915e898abb3aa1d818f92669e502373d5792f16f95b7bdeb8ebee45268d01993e3b0acbf64cff177c82f6dada8683b51acfc972112f5d07c1154d66b53d0cdc6cbd48e674ff5231361c8a0288da90b6fbf768f52154c4fd0f9820162f32b358e5d8cfef25315b248ac5e74a591531c4481876384bc57a3db91291787125f3e224ed4a72c8e7f88804de1cc8fdd439688784dccce2dc2628ed8068a7342"}, &(0x7f00000001c0)=0xd4) 17:19:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2132.382078][T26343] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2132.390093][T26343] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2132.398200][T26343] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2132.398219][T26343] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f00000017c0)={0x1, {{0xa, 0x0, 0x10000000000, @mcast1}}, {{0xa, 0x0, 0x3, @mcast2}}}, 0x108) 17:19:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="750200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:20 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:20 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000054c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000007340)=[{0x0, 0x0, &(0x7f0000005680)=[{&(0x7f0000005500)="ae0553aba60c4af31deb17b8fdda4ee565152574177dd517ebaeae2895c221dd5c3181689a5f32460795863a037281de8c8db95b7afa846ac0145316428f141b88486138a5d20fdd4d6185d59d6d458d5d74460d777e8fe42be560c9a4d0c361026e26e8b2de7d7d9616f0b98f97b1ea39418eedc685aa22d237d0255a872f4b46c05e141f5ec79d85f40d6695", 0x8d}, {&(0x7f00000055c0)="0444523919f7dbe4067541f3ce29f75800f56d2484e115cef5febb0f720531cbebd1f281bc5de347e69c3d34013e4b4eca19c1fc98194d1b56887b9e79f8995fb0bb139faf77264a73982614b95c73c7fddfe6ed5a8aa1f03a333a51b5a55b95847a6067eb49b8568f30ec1de12fb35c32230b7066145b8d38235f50f36f97770148e5a2d4cf7d7193dd52f2a8dca9af", 0x90}], 0x2, &(0x7f00000056c0)=[@assoc={0x18, 0x117, 0x4, 0x5a5bbf5e}], 0x18, 0x4000}, {0x0, 0x0, &(0x7f0000006840)=[{&(0x7f0000005700)="c39acf3b2b6606a0a3122ebb5f56203d882c7606f7a0b6a7845e7bb689881c8759c57d1c526cdfdaa7e3147fa4675119c31d8cc4a3a8c4d64d7fa1bbde8859d98587e9cd244015214151c6fa6dc361588512426677df7219e2b3f050f189f0bde94c6e068f1d7e33", 0x68}, {&(0x7f0000005780)="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", 0x1000}, {&(0x7f0000006780)="b23f840bcb384d92b18869b9cda46c13780781cbe7490068fc98d5e9cf5b2de4d830601f4890ab272e1f980a350a4d4eb095ac6911edc365e81ec9c72e83143c5309bc6bca05fd5ce2592a026e2542a9", 0x50}, {&(0x7f0000006800)}], 0x4}, {0x0, 0x0, &(0x7f0000006ac0)=[{&(0x7f0000006880)="8241fd0f61f3c65ea6997feb8b43e3d150e5d1800289f148b397ce4a4e91f493a51bda3bd8bfd99d8b477b6efd9ec0e2a2757630143ff153fc2aba58f50ac4fc76e32beb56f479d6241cbeb20d37393702f26ee4", 0x54}, {&(0x7f0000006900)="7196f2ec00b0195c05e83ffed0f2f97f36d9ddb79c6b31748c5621294b5dde1d71f120f51e2316acfbb7f2d0dd600510291dc96f69293e762e2afa8c7e62", 0x3e}, {&(0x7f0000006940)="ce4383c8c213ffba26e7c96b9fefbbd2204853ebcf437a08213824a9d4103833a7dc25e8d1b9d9f08c5f9840811c1d29f50e7d000fd7393059f461a35b8987c7be73f3a938a813e50ca34bb8e9c514a7bd6f91f740479861e7193ffef63825e9499405b48ca43a441ec942411a6bdf410636bda9f4c0e3171086fa5945079102b151e79a3dd97ef3296745072658b0e607265c3f396e2ca4574a689a37e12261d5ebcbaf166ae72c0d55b2f5762c97d351a09c3076bfff53f12b353db079b049bc7eff26aafe5909ebeccd71174fe553b29007d294dd09447b179fa9c6380eca", 0xe0}, {&(0x7f0000006a40)="ff3fdb99d2253c03729c276718916ad0210ec72ebbf895043d1a1f91b5e18c1f54f4a8f9dd0ab46ab59e27f3a5b8c955f9e52182e638c9a02a6d060f3cc0efa2e1b1860c", 0x44}], 0x4, &(0x7f0000006b00)=[@op={0x18}], 0x18, 0x20000040}, {0x0, 0x0, &(0x7f0000006cc0)=[{&(0x7f0000006b40)="238957b274e7a2191550727723cad817e7e147643fa5aaf9b9058a03db1b879abc09e8ff8828506ca8214dbafec19245203869f23e7b44f0229727b73df55e07e98adcba489b36c68a069fba41c9a9b2723e6ad3", 0x54}, {&(0x7f0000006bc0)="d9935d7816b9d5e4b3fe77b5f59dd3c1c1d3cb8b445e03355b276c86bca3f34ced66d248ad0940", 0x27}, {&(0x7f0000006c00)="50fe4358477ab35907a36dc832148294ee3a963076d856e23c6a8b6a8ecfaaefbd6cd0fa099799ea81db56638871af60555377689fd599110269419d00be3c479b6d17b28e7b63424bc3c62bd2c4a49f23", 0x51}, {&(0x7f0000006c80)="93f5b6d2a03f2c8c2ddffbd078982d1bdc988a98a4c9051341266a26379a9223ec3de81a778c0d12251362e543eef73325", 0x31}], 0x4, &(0x7f0000006d00)=[@op={0x18}], 0x18}, {0x0, 0x0, &(0x7f0000007040)=[{&(0x7f0000006d40)="84ba9cb69af903127460a98e3386783d3dcd4d17dbd6ad82867487ee43fb70b5fc0d1dfd78cab37d45e13d0376aeeccd4880f87017e5ea6682ca5ed666c42bd50807ae917bfa02a7d4e1c65c116de54d8607b0beccbaf05749309fbab27a7f3065c3cb8cf6651d75676a7cf4c9dd96816c87d45243858a1f949118ae378980e917b0982dab4924088f47809ec2798aa7cad6a765e882f91234c59328aaef9fbf46c015c4902dc9f9c8f08b588a01ab84ddb27fac852dcc91fa91e3434962cc03df7b3a862b25b5cfd46132d4e1ddb234d1c6e92ae637cbe79ee9b07c00304b1b9f775d", 0xe3}, {&(0x7f0000006e40)="a182c6e060cb31b7c5e35e77cce9acf8399fe9b68b1f9a3dfbe1ecaeacdb8162595c4b3181d7483af24c02d9af44af7703b77d2afed182d93f419237b26e99c20f7723b0e28efe80bb6057ddbea3093de557179ae9368871466cbe84795d7f6c0974be343f457980d97c47802a796a93e1e3ef38216c060a27ebd789e2cc466777fa3f49b8", 0x85}, {&(0x7f0000006f00)="23a17e1fc18d1e3b8555de5aa8f739b9ff2da823c4c9b04a6e15fc4fdab4", 0x1e}, {&(0x7f0000006f40)="8688d1f262d65ebc627362d126c59c0ce71fe08f", 0x14}, {&(0x7f0000006f80)="8071c7296267ea6cc36a4b8b1e18f9ec54357f84937fa578687dcc8abbbf19db7e1c903de92bbefdbbd4a74c446c9aaebaa40a6b92a8ad38c0ee9e5d3178fa902689546ee4b9149a1bccf6f5dae554cbe6f7d63e49ffa1cac9c74ca014cca8e940d40c0168199bfd7f47a4b3da7fa025017ddea66315ccfe0d928b2e65dc24ab487c4fab45db6a0d71e30b984af49504e94611b5d4cfcbe69a33ec64", 0x9c}], 0x5, 0x0, 0x0, 0x4}, {0x0, 0x0, &(0x7f0000007280)=[{&(0x7f00000070c0)="0ea0ff8dd30bd2d81fbf45b2fddb76ebc45639635e37e436c4726da5564499c755f27f4764b925a1bea2f3e9fd6fc638fbc37bd320ae9c1c3a57d2b9cb371c5d1ea5258747ada193dcaf9ab1f0df5a25407810d31c8e37636e5cd90590443abee393abe992eed09e5b3739f3caa167e414e2699d282e1617157d1761bc9ffc795d5c3bf9d405a0ddfe44a3fb13aea9eb20b43ee6d3843f7af0b6bfb649ec8a09542137df8ac446c21afaf3a25a4ee8968fa8b359628d0bba6b131dc5afe76197d3004c4fa67acb4c99f9747b3a66", 0xce}, {&(0x7f00000071c0)="7b67015fc2df3906a455f4d6de107b45f27f33df5975594c13f093e665ff28460cb628115a687b677a3786af277181058690c9f9aab94e9cdcf00b0cdfd12e694c9be07a82b8ae598118a2fe2e5d4e34ff48866537e628e63c76252380436b4a2e31c1da9c6b933a80b16a0cae5154367b7fdc2bfd6c3f26773d29d0662152e590ec9145cc27ff1348b80f6f251ea09fc0528c1b9cb8b0cd013ebcf5c966a6c5edbb96c11cd19ce4c2af3432145930ef3305", 0xb2}], 0x2, &(0x7f00000072c0)=[@assoc={0x18, 0x117, 0x4, 0x3f}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3, 0x1}], 0x60, 0x1}], 0x6, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000280)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_flags}) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) 17:19:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='.//..\x00\x00\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb21j\xef1Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(v\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'', 0x2761, 0x0) write(r0, &(0x7f0000000000)="da752bd4a0d27c5d356ade7170eb2ec7aba9deb6aa10ad467439a8acecf1cf4454df4621cff04ff7eeec72dfc70e7248129a554a1c78f242a5ad400dd3112e8c3b2cf6cb48e981f37f4079f45758ace885e32d1be3060ab9d5492d076a8631683d", 0x61) 17:19:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x40000000003, 0x0, 0x740000, 0x0, 0x10020000008, 0x0}, 0x21) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x40020820000, r0}, 0x2c) 17:19:20 executing program 1 (fault-call:9 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:20 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2133.184060][ C0] net_ratelimit: 7 callbacks suppressed [ 2133.184071][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2133.206866][T26392] IPVS: ftp: loaded support on port[0] = 21 [ 2133.225201][T26390] FAULT_INJECTION: forcing a failure. 17:19:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x4, 0x4, 0x7fff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x1, [0xa3]}, &(0x7f0000000180)=0x6) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") r2 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8000000008b0f, &(0x7f0000000080)={'ip6gre0\x00', @ifru_flags=0x1000}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000000)=""/78, &(0x7f00000000c0)=0x4e) [ 2133.225201][T26390] name failslab, interval 1, probability 0, space 0, times 0 [ 2133.265211][T26390] CPU: 0 PID: 26390 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2133.272818][T26390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2133.282886][T26390] Call Trace: [ 2133.286209][T26390] dump_stack+0x172/0x1f0 [ 2133.290566][T26390] should_fail.cold+0xa/0x15 [ 2133.295489][T26390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2133.301330][T26390] ? ___might_sleep+0x163/0x280 [ 2133.306206][T26390] __should_failslab+0x121/0x190 [ 2133.311169][T26390] should_failslab+0x9/0x14 [ 2133.315688][T26390] __kmalloc+0x2dc/0x740 [ 2133.320051][T26390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2133.326319][T26390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2133.332574][T26390] ? tls_get_rec+0x104/0x590 [ 2133.337191][T26390] tls_get_rec+0x104/0x590 [ 2133.341634][T26390] tls_sw_sendmsg+0xda5/0x17b0 [ 2133.346426][T26390] ? tx_work_handler+0xf0/0xf0 [ 2133.352703][T26390] ? aa_sk_perm+0x288/0x880 [ 2133.357229][T26390] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2133.362792][T26390] inet_sendmsg+0x147/0x5e0 [ 2133.367305][T26390] ? ipip_gro_receive+0x100/0x100 [ 2133.372336][T26390] sock_sendmsg+0xf2/0x170 [ 2133.376757][T26390] __sys_sendto+0x262/0x380 [ 2133.381267][T26390] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2133.386664][T26390] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2133.392230][T26390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2133.398486][T26390] ? fput_many+0x12c/0x1a0 [ 2133.402915][T26390] ? fput+0x1b/0x20 [ 2133.406827][T26390] ? ksys_write+0x1cf/0x290 [ 2133.411349][T26390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2133.416826][T26390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2133.422300][T26390] ? do_syscall_64+0x26/0x680 [ 2133.426987][T26390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2133.433072][T26390] __x64_sys_sendto+0xe1/0x1a0 [ 2133.437870][T26390] do_syscall_64+0x103/0x680 [ 2133.442507][T26390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2133.448409][T26390] RIP: 0033:0x458da9 [ 2133.452315][T26390] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2133.471943][T26390] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2133.481133][T26390] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2133.489114][T26390] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2133.497094][T26390] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2133.505546][T26390] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2133.513533][T26390] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:20 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="100100001000130700000000000000000000000000000000000000000000000000000000000000000000ffffac14ffaa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000854ea248020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000002000170001000000000000e83e1b9dd9d8782567ab40c0b486f7af2f173c785b74f774d98aa1f75d514f0140ea4f29b74f5b93e7cadc7c9265beb244740ff6fdd78a12"], 0x110}}, 0x0) [ 2133.743561][T26407] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 17:19:21 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x13}, 0x40, 0x0, 0xff, 0x1, 0xe48, 0x40}, 0x20) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 2133.824426][T26392] IPVS: ftp: loaded support on port[0] = 21 17:19:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="760200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:21 executing program 1 (fault-call:9 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @initdev, @ipv4={[], [], @initdev}, 0x0, 0x0, 0xfc}) 17:19:21 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) accept4$netrom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$rose(r3, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept$inet(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffcd1, 0x100, &(0x7f00000000c0), 0x1c) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000000)={0x87, @remote, 0x4e20, 0x4, 'lc\x00', 0x8, 0x0, 0x6b}, 0x2c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) shutdown(r2, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:19:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3d8a010018004600000000000100000700000000897294d04dd992673983c6e8c9b5b8ec45451f760000000000000000ee309c33843de3ab90384dd26d48b1265413d895f8d5be"], 0x0, 0x32}, 0x20) 17:19:21 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x13, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) vmsplice(r1, &(0x7f0000001740)=[{&(0x7f00000003c0)="193b6afdff003c1fc37a03bfa552ad3e586e95800381782749caa6913a47128df6acf889fe6a42479b01e64c1edc96bceeea7e02c58658c88078ae7e6f62d487f0c4a5063aa0143e6b727a7e66f1f36c131c1284fb851e5691122aba2285b297c969793c840b16442117935e2f9a50a4828644505c93d930c77361579cb5e3bf9fb9ae891efef169c2768d41746a95497cf4d2cec7e4a067b594439d369f23d6ceeabcfc421125269a5f644213e12fbf3e98bc739d75f0702c11c18e26ce0c29d85a033d3e3baf362e25487767e28de7cce471cebf3f2a5da4fdbd8ccdbdb14fb972f794530d", 0xe6}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000040)="7334d92f2334bc", 0x7}, {&(0x7f00000014c0)="4827bc940041fd6d7a7b1f4c833b8adda802b9d5ddb00b6e227b581516712fe470cd7510178418c62c7003d820a7121d896cbd60c833ee506ef4af3f2cb4770428eb38f1911b83b3f3", 0x49}, {&(0x7f0000001540)="412795670eadc2bfefd1e6a9eebb4137a52df0e2f9ad83d068945e60d3c75a91e667f7d5f78ede100fb877a60c14a1b2a7e3127759b221fe159a265db3c0ef6c43", 0x41}, {&(0x7f00000015c0)="0ba90c1388b5ee26941ae49210f93622ca66867cfa8af630df9bf238556981471d747aef3b49a288591e56ffeaf8c2d8f9ddc143df9ec5d6e3e01482d5023c0fecc5de4700234339c0ccaec689ab49cb56b8096aeaeb68aef695350e27af2dd36b838d5e8e6236", 0x67}, {&(0x7f0000001640)="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", 0xfb}], 0x7, 0x0) r4 = accept4$netrom(0xffffffffffffffff, &(0x7f00000017c0)={{}, [@null, @rose, @default, @rose, @netrom, @rose, @netrom, @netrom]}, &(0x7f0000000080)=0x48, 0x0) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000001840)=0x28, 0x4) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x4e23, 0x101, 0x4e23, 0xffff, 0xa, 0x80, 0xdf58cebc703dc0cd, 0x2c, r2, r3}, {0x1, 0x1, 0x6, 0x4, 0x8, 0x3, 0x7, 0xb2ac}, {0x1, 0x8000, 0x9, 0x2}, 0x3f, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x25}, 0x4d4, 0xff}, 0xa, @in6=@remote, 0x0, 0x3, 0x3, 0x3, 0x8, 0x5, 0x9}}, 0xe8) [ 2134.566660][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2134.603353][T26438] FAULT_INJECTION: forcing a failure. [ 2134.603353][T26438] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.638234][T26438] CPU: 1 PID: 26438 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2134.645824][T26438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2134.655894][T26438] Call Trace: [ 2134.659211][T26438] dump_stack+0x172/0x1f0 [ 2134.663566][T26438] should_fail.cold+0xa/0x15 [ 2134.668207][T26438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2134.674043][T26438] ? ___might_sleep+0x163/0x280 [ 2134.678911][T26438] __should_failslab+0x121/0x190 [ 2134.684422][T26438] should_failslab+0x9/0x14 [ 2134.688951][T26438] kmem_cache_alloc_node+0x264/0x710 [ 2134.694342][T26438] ? ktime_get+0x208/0x300 [ 2134.698783][T26438] __alloc_skb+0xd5/0x5e0 [ 2134.703134][T26438] ? skb_trim+0x190/0x190 [ 2134.707491][T26438] sk_stream_alloc_skb+0x326/0xd80 [ 2134.713008][T26438] do_tcp_sendpages+0xafa/0x1b70 [ 2134.717984][T26438] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2134.723302][T26438] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2134.729043][T26438] tls_push_sg+0x1de/0x680 [ 2134.733477][T26438] tls_tx_records+0x3c8/0x760 [ 2134.738173][T26438] tls_push_record+0x1f67/0x3580 [ 2134.743145][T26438] ? tls_tx_records+0x760/0x760 [ 2134.748009][T26438] ? lock_downgrade+0x880/0x880 [ 2134.752872][T26438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.759136][T26438] ? kasan_check_read+0x11/0x20 [ 2134.764012][T26438] bpf_exec_tx_verdict+0xe30/0x1280 [ 2134.769234][T26438] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2134.775058][T26438] ? tls_push_record+0x3580/0x3580 [ 2134.780255][T26438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2134.786516][T26438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2134.792772][T26438] ? sk_msg_alloc+0x62d/0x8d0 [ 2134.797477][T26438] tls_sw_sendmsg+0x107c/0x17b0 [ 2134.802363][T26438] ? tx_work_handler+0xf0/0xf0 [ 2134.807148][T26438] ? aa_sk_perm+0x288/0x880 [ 2134.811763][T26438] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2134.817332][T26438] inet_sendmsg+0x147/0x5e0 [ 2134.821854][T26438] ? ipip_gro_receive+0x100/0x100 [ 2134.826899][T26438] sock_sendmsg+0xf2/0x170 [ 2134.831335][T26438] __sys_sendto+0x262/0x380 [ 2134.835865][T26438] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2134.841267][T26438] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2134.846846][T26438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2134.853111][T26438] ? fput_many+0x12c/0x1a0 [ 2134.857564][T26438] ? fput+0x1b/0x20 [ 2134.861401][T26438] ? ksys_write+0x1cf/0x290 [ 2134.865952][T26438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2134.871432][T26438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2134.876911][T26438] ? do_syscall_64+0x26/0x680 [ 2134.881614][T26438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.887706][T26438] __x64_sys_sendto+0xe1/0x1a0 [ 2134.892501][T26438] do_syscall_64+0x103/0x680 [ 2134.897164][T26438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2134.903186][T26438] RIP: 0033:0x458da9 [ 2134.907092][T26438] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2134.926727][T26438] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 17:19:22 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:22 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:22 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:22 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2134.935169][T26438] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2134.943165][T26438] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2134.951414][T26438] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2134.959667][T26438] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2134.967646][T26438] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="770200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x4, &(0x7f0000000180)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x28}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x70) 17:19:23 executing program 1 (fault-call:9 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @initdev, @ipv4={[], [], @initdev}, 0x0, 0x0, 0xfc}) 17:19:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='cgroup.con\x9c\xcec\x00&\xaf\x9b6\xbc\x05x\x94<\xfab\x9d=\x13 \x8b\xd7/\xd0\xbe\n\xa1\x16\x83\xd9Yyv_\xcc\xb1q&>\x17\xc6H\xa1\x91\\V\xc61\x94\xdeV}\xf6\nO\x89\xb6_xb\t\t\x997\xe4\x8a\xbd3\xb8\xabFv\xed,&\xbc\x99+\xaa\xce\xc9\xd8V\xdd\x00S%\xde\xe3\x1b\xf5\x89\xe16xm>\xc6\xae\xa3\\e#RB#J\"\\\x96P\x15\xd3\x92\xea@\x1d\x9b,\xb4\xffd\xfcz`\xd5\x81\xcf\x11\x83ro\x01Z\xbac\xe6\xf7\xf6\x1b\x12\x11\x1e\xef\xf4^\xaa\xc1D\xb4\xa5\xc4\xeb\xbd\x1fP\xfe\x00\xd7@@\t\xf2\xe2\xdb\xe3(\x92\xce\x1c=1\v0\xd2\xdfE\xa9\xcdD~X\xe3H\x8c\xaa\x13Fu\'\x12]\x8c\x06TA\x86\xbd\xdf5\xe3j\xa0\x00V\xbd\x92U\xbb_;\xb6\x97\x16\x98\x9d!#\xaa\xe5\xd9`\xfc\x94t\x98 \x9eE\x830x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002740)=0xe8) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x401) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000002780)={@loopback, @loopback, r3}, 0xc) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {}], 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={0x8}, 0x8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@loopback, @dev, @loopback}) 17:19:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="0e6d2b37373ac20cfec265a4c04d315a3c7bd67efde9721071b464e6f6f3508f44ea7ff4933748800b822062cf2a1bf6d9a348f3b8569d2b08f9e46b74493425bc820fda7713c8855d727571cf220e6ee5391681361b9763d7d6c87d72cc705b8885a8d91cdf5c34ff865859995c258fe9836ba0e8b6e48f49d39eca208fb859c6214d5dc8", 0x85}, {&(0x7f0000001340)="3b1fd1382ee74fbd6be3e5b727b1103e19ae229b931fc4bd23fefbd3cbc84cea6e6ebd0c4a6997b89d91799e7203dfa85ea77ae51a581de7c86d29b66768a302fab1baebbd8d72b9b7633a24e4192680d3c5f3694b5244f9a4f6b7372814907f36e20da38d22298b8d217d95e96de33332477676ca8e709938bf09211d4b0fb616bfac89f69dcc0eb6baa0d0ed5c1b10932863b24d6128ff5f9e986a37feef0dfbf6c288", 0xa4}], 0x3}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffd7f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x8356) 17:19:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeaffffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2136.116344][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2136.137891][T26477] FAULT_INJECTION: forcing a failure. [ 2136.137891][T26477] name failslab, interval 1, probability 0, space 0, times 0 [ 2136.206990][T26477] CPU: 1 PID: 26477 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2136.214581][T26477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2136.224652][T26477] Call Trace: [ 2136.227961][T26477] dump_stack+0x172/0x1f0 [ 2136.232316][T26477] should_fail.cold+0xa/0x15 [ 2136.236918][T26477] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2136.242737][T26477] ? ___might_sleep+0x163/0x280 [ 2136.247612][T26477] __should_failslab+0x121/0x190 [ 2136.252563][T26477] should_failslab+0x9/0x14 [ 2136.257135][T26477] kmem_cache_alloc_node_trace+0x270/0x720 [ 2136.262963][T26477] __kmalloc_node_track_caller+0x3d/0x70 [ 2136.268619][T26477] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2136.274006][T26477] __alloc_skb+0x10b/0x5e0 [ 2136.278442][T26477] ? skb_trim+0x190/0x190 [ 2136.282784][T26477] sk_stream_alloc_skb+0x326/0xd80 [ 2136.287912][T26477] do_tcp_sendpages+0xafa/0x1b70 [ 2136.292974][T26477] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2136.298280][T26477] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2136.304014][T26477] tls_push_sg+0x1de/0x680 [ 2136.308448][T26477] tls_tx_records+0x3c8/0x760 [ 2136.313147][T26477] tls_push_record+0x1f67/0x3580 [ 2136.318122][T26477] ? tls_tx_records+0x760/0x760 [ 2136.322987][T26477] ? lock_downgrade+0x880/0x880 [ 2136.327867][T26477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.334149][T26477] ? kasan_check_read+0x11/0x20 [ 2136.339010][T26477] bpf_exec_tx_verdict+0xe30/0x1280 [ 2136.344221][T26477] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2136.349949][T26477] ? tls_push_record+0x3580/0x3580 [ 2136.355145][T26477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2136.361486][T26477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2136.367735][T26477] ? sk_msg_alloc+0x62d/0x8d0 [ 2136.372430][T26477] tls_sw_sendmsg+0x107c/0x17b0 [ 2136.377317][T26477] ? tx_work_handler+0xf0/0xf0 [ 2136.382094][T26477] ? aa_sk_perm+0x288/0x880 [ 2136.386718][T26477] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2136.392368][T26477] inet_sendmsg+0x147/0x5e0 [ 2136.396887][T26477] ? ipip_gro_receive+0x100/0x100 [ 2136.401925][T26477] sock_sendmsg+0xf2/0x170 [ 2136.406360][T26477] __sys_sendto+0x262/0x380 [ 2136.410884][T26477] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2136.416463][T26477] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2136.422035][T26477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2136.428434][T26477] ? fput_many+0x12c/0x1a0 [ 2136.432861][T26477] ? fput+0x1b/0x20 [ 2136.436690][T26477] ? ksys_write+0x1cf/0x290 [ 2136.441217][T26477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2136.446685][T26477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2136.452160][T26477] ? do_syscall_64+0x26/0x680 [ 2136.456855][T26477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2136.462982][T26477] __x64_sys_sendto+0xe1/0x1a0 [ 2136.467772][T26477] do_syscall_64+0x103/0x680 [ 2136.472380][T26477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2136.478296][T26477] RIP: 0033:0x458da9 [ 2136.482672][T26477] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:19:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r2, 0x0, 0x1ff) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)=0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0)="684605199f781b8746e2fde9c19262bd552de20e767861c70ac376ec30b1fba609ddfdfa549c3190f56bf858381c4151143872b317e6fd3028fda3", &(0x7f0000000140)=""/123}, 0x18) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendto$llc(r2, &(0x7f0000000000)="c1b3d28ceb578779f50e77948740967a76ce04938e702381d0eae16b470228892086c6b820ae38d1988bb052c1f2e8b240b9a70018a9e22e8184684ea2b5257805d38f8376121c0aea8e3116cf79abc5b8ca1529daee1b85cafcaeccf0ed9795", 0x60, 0x40000, &(0x7f0000000080)={0x1a, 0x2, 0x100000000, 0x5, 0x0, 0x75, @broadcast}, 0x10) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 17:19:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x11, 0x2, 0x0) setsockopt(r1, 0x107, 0x1, &(0x7f0000d52ff0)="0f0000000200060000071a80000001cc", 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e20, @local}], 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x1, {{0x2, 0x4e23, @empty}}}, 0x88) 17:19:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x10001, 0x2, @rand_addr="5f5d3c3118fea4e9477f94c8d0ebd961", 0xc60}, 0xfffffdd8) listen(r1, 0xa) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000000180)="388a764574b69654a53a1bb7097e5ca785db0a5b64ace919791f6bd5cd0edf77bd4f75f9c9403c43929fc290da393b28096b4ccef7fc0dce7b2456aa9e6d11d7acaf3b173b9f739be64a495517073827be7641c611b60cbfa22d32ed520f9eb8a683be803a8f22078f5e6658f70afca81d07d4114aadb5b68d2bd80548724ac69e8c157d4b6d7b9e77ba4f77ee19701e876e744a3f8cd499da63cf328adfd283a31ba3367ae8bf7cde156ea1e72611", 0xaf, 0x80, &(0x7f0000000240)={0xa, 0x4e22, 0x0, @mcast1, 0xffff}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000100)=""/18, &(0x7f0000000140)=0x12) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="4155c7fec9d700000000000000003445e23e0000e9ab27b9ba995fca1444f9dbeaca0510bcbb7af710f043b95bf44e83d07348312325f88aa2"], 0x8) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3f, 0xfffffffffffffffd, 0x3, 0x0, 0xffffffffffffff62, 0x0, 0x7ff}, 0x1c) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x6) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2136.502285][T26477] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2136.510820][T26477] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2136.518816][T26477] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2136.526789][T26477] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2136.526798][T26477] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2136.526806][T26477] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="780200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:24 executing program 1 (fault-call:9 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="5500000018007f1de7fe01b2a4a280930a00030000000000000000003900090035000c000600000019000500fe800000000000dc1338d54400009b8413200000008307008daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000000c0)={@multicast2, @local, r1}, 0xc) r2 = socket(0x10, 0x80002, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000000)={@initdev, @dev}, &(0x7f0000000100)=0xc) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000)}], 0x231, 0x0) 17:19:24 executing program 4: r0 = accept(0xffffffffffffff9c, &(0x7f0000000180)=@caif=@dbg, &(0x7f0000000200)=0x80) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000240)=@int=0x131f, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) pipe(&(0x7f0000000280)={0xffffffffffffffff}) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20002000, 0x0, 0x711004, 0x0, 0x0, [], 0x0, r2}, 0x3c) 17:19:24 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:24 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={0xffffffffffffff9c}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000280)={@initdev}, &(0x7f00000002c0)=0x14) socket$inet6(0xa, 0x1, 0x800) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) connect$bt_sco(r0, &(0x7f0000000180)={0x1f, {0x7, 0x1000, 0x3, 0x8, 0x0, 0x10000}}, 0x8) setsockopt$ax25_int(r1, 0x101, 0x1, &(0x7f0000000000), 0x2b) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x8, 0x2}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r2, 0xfffffffffffffffe}, &(0x7f0000000100)=0x8) r3 = accept4(r1, &(0x7f0000000f40)=@alg, &(0x7f0000000fc0)=0x80, 0x80000) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xd644}, 0x1c) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000001000)={@loopback}, &(0x7f0000001040)=0x14) 17:19:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f163c123f319bd070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f0000000040)=0x7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2010}) [ 2137.419657][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2137.447122][T26517] FAULT_INJECTION: forcing a failure. [ 2137.447122][T26517] name failslab, interval 1, probability 0, space 0, times 0 [ 2137.468288][T26517] CPU: 1 PID: 26517 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2137.475884][T26517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2137.486877][T26517] Call Trace: [ 2137.486909][T26517] dump_stack+0x172/0x1f0 [ 2137.494534][T26517] should_fail.cold+0xa/0x15 [ 2137.499137][T26517] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2137.504960][T26517] ? ___might_sleep+0x163/0x280 [ 2137.509818][T26517] __should_failslab+0x121/0x190 [ 2137.514760][T26517] should_failslab+0x9/0x14 [ 2137.519281][T26517] __kmalloc+0x2dc/0x740 [ 2137.523527][T26517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2137.529789][T26517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2137.536032][T26517] ? tls_get_rec+0x104/0x590 [ 2137.540639][T26517] tls_get_rec+0x104/0x590 [ 2137.545068][T26517] tls_sw_sendmsg+0xda5/0x17b0 [ 2137.549875][T26517] ? tx_work_handler+0xf0/0xf0 [ 2137.554640][T26517] ? aa_sk_perm+0x288/0x880 [ 2137.559158][T26517] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2137.564721][T26517] inet_sendmsg+0x147/0x5e0 [ 2137.569226][T26517] ? ipip_gro_receive+0x100/0x100 [ 2137.574260][T26517] sock_sendmsg+0xf2/0x170 [ 2137.578687][T26517] __sys_sendto+0x262/0x380 [ 2137.583203][T26517] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2137.588605][T26517] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2137.594179][T26517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2137.600429][T26517] ? fput_many+0x12c/0x1a0 [ 2137.604850][T26517] ? fput+0x1b/0x20 [ 2137.608673][T26517] ? ksys_write+0x1cf/0x290 [ 2137.613189][T26517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2137.618664][T26517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2137.624137][T26517] ? do_syscall_64+0x26/0x680 [ 2137.628834][T26517] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2137.634916][T26517] __x64_sys_sendto+0xe1/0x1a0 [ 2137.639698][T26517] do_syscall_64+0x103/0x680 [ 2137.644299][T26517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2137.650193][T26517] RIP: 0033:0x458da9 [ 2137.654089][T26517] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2137.673791][T26517] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2137.682219][T26517] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2137.690208][T26517] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2137.698189][T26517] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2137.706187][T26517] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x4, 0x4, 0x10070}, 0xe7) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x12, 0x4) syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001400)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='bcsf0\x00\x00\x00\x00\x00\x00\x00\x11\x00\x00\x13') 17:19:25 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2137.714165][T26517] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:25 executing program 4: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xc5) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) poll(0x0, 0x0, 0x9) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x400, 0x4, 0x8000, 0x10000, 0x9, 0x1c630760, 0x4, 0x100, r2}, 0x20) sendfile(r1, r1, &(0x7f0000000100), 0xe08c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000700)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 17:19:25 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:25 executing program 1 (fault-call:9 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2138.048074][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2138.068588][T26541] FAULT_INJECTION: forcing a failure. [ 2138.068588][T26541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2138.107212][T26541] CPU: 0 PID: 26541 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2138.114808][T26541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2138.124874][T26541] Call Trace: [ 2138.128186][T26541] dump_stack+0x172/0x1f0 [ 2138.132540][T26541] should_fail.cold+0xa/0x15 [ 2138.137148][T26541] ? __sys_sendto+0x262/0x380 [ 2138.141836][T26541] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2138.147688][T26541] should_fail_alloc_page+0x50/0x60 [ 2138.152901][T26541] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2138.158466][T26541] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2138.164114][T26541] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2138.169847][T26541] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2138.175508][T26541] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2138.181764][T26541] alloc_pages_current+0x107/0x210 [ 2138.186896][T26541] skb_page_frag_refill+0x277/0x460 [ 2138.192120][T26541] sk_page_frag_refill+0x55/0x1f0 [ 2138.197166][T26541] sk_msg_alloc+0x10e/0x8d0 [ 2138.201695][T26541] tls_sw_sendmsg+0x63c/0x17b0 [ 2138.206485][T26541] ? tx_work_handler+0xf0/0xf0 [ 2138.211253][T26541] ? aa_sk_perm+0x288/0x880 [ 2138.215783][T26541] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2138.221339][T26541] inet_sendmsg+0x147/0x5e0 [ 2138.225851][T26541] ? ipip_gro_receive+0x100/0x100 [ 2138.230902][T26541] sock_sendmsg+0xf2/0x170 [ 2138.235326][T26541] __sys_sendto+0x262/0x380 [ 2138.239837][T26541] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2138.245218][T26541] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2138.250786][T26541] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2138.257046][T26541] ? fput_many+0x12c/0x1a0 [ 2138.261468][T26541] ? fput+0x1b/0x20 [ 2138.265286][T26541] ? ksys_write+0x1cf/0x290 [ 2138.269799][T26541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2138.275270][T26541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2138.280739][T26541] ? do_syscall_64+0x26/0x680 [ 2138.285863][T26541] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2138.291955][T26541] __x64_sys_sendto+0xe1/0x1a0 [ 2138.296753][T26541] do_syscall_64+0x103/0x680 [ 2138.301366][T26541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2138.307292][T26541] RIP: 0033:0x458da9 [ 2138.311201][T26541] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2138.330909][T26541] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2138.339424][T26541] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2138.347925][T26541] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2138.355911][T26541] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2138.364008][T26541] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2138.371993][T26541] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="790200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:26 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:26 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{&(0x7f0000001140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001440)=[{&(0x7f00000011c0)=""/154, 0x9a}, {&(0x7f0000001280)=""/130, 0x82}, {&(0x7f0000001340)=""/34, 0x22}, {&(0x7f0000001380)=""/177, 0xb1}], 0x4, &(0x7f0000001480)=""/199, 0xc7}, 0x4}, {{&(0x7f0000001580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001600)=""/219, 0xdb}], 0x1, &(0x7f0000001740)=""/100, 0x64}}, {{&(0x7f00000017c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001840)=""/236, 0xec}, {&(0x7f0000001940)=""/233, 0xe9}, {&(0x7f0000001a40)=""/135, 0x87}], 0x3}, 0x62d}, {{&(0x7f0000001b40)=@sco, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/213, 0xd5}, {&(0x7f0000001cc0)=""/4096, 0x1000}], 0x2}, 0x20}, {{&(0x7f0000002d00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002d80)=""/90, 0x5a}, {&(0x7f0000002e00)=""/254, 0xfe}, {&(0x7f0000002f00)=""/1, 0x1}, {&(0x7f0000002f40)=""/39, 0x27}, {&(0x7f0000002f80)=""/224, 0xe0}, {&(0x7f0000003080)=""/55, 0x37}], 0x6, &(0x7f0000003140)}}, {{&(0x7f0000003180)=@tipc, 0x80, &(0x7f0000003280)=[{&(0x7f0000003200)=""/71, 0x47}], 0x1, &(0x7f00000032c0)=""/32, 0x20}, 0x401}, {{&(0x7f0000003300)=@sco, 0x80, &(0x7f0000003640)=[{&(0x7f0000003380)=""/133, 0x85}, {&(0x7f0000003440)=""/132, 0x84}, {&(0x7f0000003500)=""/38, 0x26}, {&(0x7f0000003540)=""/195, 0xc3}], 0x4}, 0xe8}, {{&(0x7f0000003680)=@in, 0x80, &(0x7f0000004700)=[{&(0x7f0000003700)=""/4096, 0x1000}], 0x1, &(0x7f0000004740)=""/137, 0x89}, 0x5}, {{0x0, 0x0, &(0x7f0000006ac0)=[{&(0x7f0000004800)=""/90, 0x5a}, {&(0x7f0000004880)=""/16, 0x10}, {&(0x7f00000048c0)=""/159, 0x9f}, {&(0x7f0000004980)}, {&(0x7f00000049c0)=""/7, 0x7}, {&(0x7f0000004a00)=""/70, 0x46}, {&(0x7f0000004a80)=""/4096, 0x1000}, {&(0x7f0000005a80)=""/4096, 0x1000}, {&(0x7f0000006a80)=""/36, 0x24}], 0x9}, 0x6}, {{&(0x7f0000006b80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006c00)=""/140, 0x8c}], 0x1}, 0x4}], 0xa, 0x20, &(0x7f0000006f80)={0x77359400}) bind$inet6(r0, &(0x7f0000006fc0)={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x1c}, 0x5}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x76, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000001100)=0xc) 17:19:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000080)=0x1, 0x4) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000440)=ANY=[@ANYBLOB="0e000000a5233c2f67d7f26558d114d8317b5938d228b2f133694a"], &(0x7f0000000140)=0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8000, 0x0, 0x5}, 0x10) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) socket$inet_sctp(0x2, 0x25, 0x84) sendfile(r1, r1, &(0x7f0000000100), 0xe08c) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000280)="17239309b4374c73935faa74d0d23c0ecab88275e99f5fa0d56caf59038eaa42f6369ab500a98616f4731cdd144af02c6981762923c4e84bcee59a8b70af514ca8265289a3e0c684a761d02f0f22e12c8e843d8b3daa6409d867cb3b51b953eeb51a11", 0x63}], 0x1, 0x0, 0x0, 0x800}, 0x1) accept4(r0, &(0x7f0000000340)=@pppol2tpin6, &(0x7f00000003c0)=0x80, 0x80800) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000200)=@ll, 0x80, &(0x7f00000003c0)}, 0x21) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000880)={@empty, @ipv4, @mcast2, 0x9, 0x8001, 0x0, 0x400, 0x0, 0x40000}) socket$inet6(0xa, 0x80003, 0x0) unshare(0x40000000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000700), &(0x7f0000000740)=0x4) socket$inet6(0xa, 0x0, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) socket$bt_bnep(0x1f, 0x3, 0x4) 17:19:26 executing program 1 (fault-call:9 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:26 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x1}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, 0x0, 0x0) 17:19:26 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x6, @mcast2, 0x80000001}, 0x1c) socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0xfffffffffffffffd, 0x0, @dev, 0x4}, 0x1bd) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) [ 2139.666086][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:26 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2139.706978][T26568] FAULT_INJECTION: forcing a failure. [ 2139.706978][T26568] name failslab, interval 1, probability 0, space 0, times 0 [ 2139.721521][T26568] CPU: 0 PID: 26568 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2139.729279][T26568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2139.739443][T26568] Call Trace: [ 2139.742766][T26568] dump_stack+0x172/0x1f0 [ 2139.747125][T26568] should_fail.cold+0xa/0x15 [ 2139.751741][T26568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2139.757580][T26568] ? ___might_sleep+0x163/0x280 [ 2139.762467][T26568] __should_failslab+0x121/0x190 [ 2139.767429][T26568] should_failslab+0x9/0x14 [ 2139.771956][T26568] __kmalloc+0x2dc/0x740 [ 2139.776241][T26568] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2139.782503][T26568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2139.788764][T26568] ? tls_get_rec+0x104/0x590 [ 2139.793463][T26568] tls_get_rec+0x104/0x590 [ 2139.797899][T26568] tls_sw_sendmsg+0xda5/0x17b0 [ 2139.802696][T26568] ? tx_work_handler+0xf0/0xf0 [ 2139.807484][T26568] ? aa_sk_perm+0x288/0x880 [ 2139.812014][T26568] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2139.817584][T26568] inet_sendmsg+0x147/0x5e0 [ 2139.822119][T26568] ? ipip_gro_receive+0x100/0x100 [ 2139.827253][T26568] sock_sendmsg+0xf2/0x170 [ 2139.831688][T26568] __sys_sendto+0x262/0x380 [ 2139.836220][T26568] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2139.841626][T26568] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2139.847203][T26568] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2139.853461][T26568] ? fput_many+0x12c/0x1a0 [ 2139.857885][T26568] ? fput+0x1b/0x20 [ 2139.861699][T26568] ? ksys_write+0x1cf/0x290 [ 2139.866224][T26568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2139.871704][T26568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2139.877189][T26568] ? do_syscall_64+0x26/0x680 [ 2139.881889][T26568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2139.887983][T26568] __x64_sys_sendto+0xe1/0x1a0 [ 2139.892778][T26568] do_syscall_64+0x103/0x680 [ 2139.897385][T26568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2139.903289][T26568] RIP: 0033:0x458da9 [ 2139.907191][T26568] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2139.926815][T26568] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2139.935247][T26568] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2139.943248][T26568] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2139.951236][T26568] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2139.951254][T26568] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2139.967220][T26568] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:27 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffea]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:27 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000180)={@default, @default, 0x2, 0x20}) r3 = socket(0x7, 0x80000, 0xfffffffffffffff7) getsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x4) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x7ff}, 0xb) recvmmsg(r4, &(0x7f0000004900), 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) [ 2140.144297][T26587] IPVS: ftp: loaded support on port[0] = 21 17:19:27 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:27 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000140)=0x8) close(0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) [ 2140.733540][T26587] IPVS: ftp: loaded support on port[0] = 21 17:19:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="7a0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:28 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:28 executing program 1 (fault-call:9 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x3, 0xf, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000540)={{0xa, 0x4e20, 0x80000000, @mcast2, 0x7}, {0xa, 0x4e24, 0xee, @ipv4={[], [], @loopback}, 0x5}, 0x0, [0x8001, 0x100000000, 0x5, 0xbb, 0x3, 0x8, 0x8, 0x3]}, 0x5c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = accept4(r1, 0x0, &(0x7f0000000100), 0x80000) r7 = accept4(r0, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000200)=0x80, 0x80000) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x5, 0x6, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={r0}) r11 = accept(r1, &(0x7f0000000300)=@can, &(0x7f0000000380)=0x80) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000003c0)={r0}) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x9c, r4, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x43}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000040) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000640)=@nat={'Xat\x00\x00\x00\x00\x00\x00\x03\xe0\x01\x00', 0x19, 0x3, 0x90, [0x20001600, 0x0, 0x0, 0x200018d8, 0x20001908], 0x0, 0x0, &(0x7f0000001600)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) 17:19:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x5, 0x4) r2 = accept$inet(0xffffffffffffff9c, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x1f}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000400)={r3, 0x100000001}, &(0x7f0000000440)=0x8) r4 = accept(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x80) sendto$inet6(r4, &(0x7f0000000280)="827eb5b6c20893fdb0d30423a00f0f87256f8bfd8d5ab5d28dc2771472c34d9a0f43199918a30369a3a4db353554cc7065fb675b207f787e7db80583e24e232d4b9c35cbbba5d045d03ab5dfa869077cc418f8978f368685c2e2643f232756cb8494c7c888cee5d77b5675303fc1912aedce961e0c8af71c234e1245a4a6c836935e0b14a08f191bedb08181326bcabdfc9e062486938c971e8918e2973c871d58d113d166a30d39bb14d0cdb27956dd51a7932af4408a0d647f84de5ffa1b", 0xbf, 0x1, &(0x7f0000000140)={0xa, 0x4e23, 0x100000000, @rand_addr="1b8ef95d2c26f954fc10b6e50b4dfb6f", 0x4de}, 0x1c) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x5, 0x0, 0x0, {{}, 0xfffffffffffff000, 0x400b, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000000) 17:19:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000140), 0x4) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000500)={r1, 0x1}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x8, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 17:19:28 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept$inet(r1, 0x0, &(0x7f00000000c0)) 17:19:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000001740)=ANY=[@ANYBLOB='\x00'], 0x1) close(r0) close(r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) [ 2141.245400][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2141.260963][T26622] FAULT_INJECTION: forcing a failure. [ 2141.260963][T26622] name failslab, interval 1, probability 0, space 0, times 0 [ 2141.291486][T26622] CPU: 0 PID: 26622 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2141.299081][T26622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2141.313013][T26622] Call Trace: [ 2141.313046][T26622] dump_stack+0x172/0x1f0 [ 2141.313070][T26622] should_fail.cold+0xa/0x15 [ 2141.313090][T26622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2141.313116][T26622] ? ___might_sleep+0x163/0x280 [ 2141.313140][T26622] __should_failslab+0x121/0x190 [ 2141.313158][T26622] should_failslab+0x9/0x14 [ 2141.313175][T26622] kmem_cache_alloc_node+0x264/0x710 [ 2141.313201][T26622] __alloc_skb+0xd5/0x5e0 [ 2141.313220][T26622] ? skb_trim+0x190/0x190 [ 2141.313235][T26622] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2141.313248][T26622] ? tcp_enter_memory_pressure+0x130/0x130 [ 2141.313265][T26622] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2141.313286][T26622] sk_stream_alloc_skb+0x326/0xd80 [ 2141.313309][T26622] do_tcp_sendpages+0xafa/0x1b70 [ 2141.313343][T26622] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2141.313367][T26622] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2141.313387][T26622] tls_push_sg+0x1de/0x680 [ 2141.313416][T26622] tls_tx_records+0x3c8/0x760 [ 2141.409647][T26622] tls_push_record+0x1f67/0x3580 [ 2141.414657][T26622] ? tls_tx_records+0x760/0x760 [ 2141.419521][T26622] ? lock_downgrade+0x880/0x880 [ 2141.424376][T26622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.430640][T26622] ? kasan_check_read+0x11/0x20 [ 2141.435507][T26622] bpf_exec_tx_verdict+0xe30/0x1280 [ 2141.440815][T26622] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2141.446548][T26622] ? tls_push_record+0x3580/0x3580 [ 2141.451744][T26622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2141.458009][T26622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2141.464285][T26622] ? sk_msg_alloc+0x62d/0x8d0 [ 2141.468990][T26622] tls_sw_sendmsg+0x107c/0x17b0 [ 2141.473875][T26622] ? tx_work_handler+0xf0/0xf0 [ 2141.479750][T26622] ? aa_sk_perm+0x288/0x880 [ 2141.484276][T26622] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2141.489839][T26622] inet_sendmsg+0x147/0x5e0 [ 2141.494355][T26622] ? ipip_gro_receive+0x100/0x100 [ 2141.499391][T26622] sock_sendmsg+0xf2/0x170 [ 2141.503916][T26622] __sys_sendto+0x262/0x380 [ 2141.508430][T26622] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2141.513905][T26622] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2141.519498][T26622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2141.525753][T26622] ? fput_many+0x12c/0x1a0 [ 2141.530175][T26622] ? fput+0x1b/0x20 [ 2141.533986][T26622] ? ksys_write+0x1cf/0x290 [ 2141.538505][T26622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.543975][T26622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.549524][T26622] ? do_syscall_64+0x26/0x680 [ 2141.554210][T26622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.560293][T26622] __x64_sys_sendto+0xe1/0x1a0 [ 2141.565078][T26622] do_syscall_64+0x103/0x680 [ 2141.569715][T26622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.575629][T26622] RIP: 0033:0x458da9 [ 2141.579551][T26622] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2141.599172][T26622] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2141.607605][T26622] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2141.615598][T26622] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2141.623583][T26622] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2141.631573][T26622] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2141.639563][T26622] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:28 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:29 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@ethernet={0x0, @link_local}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000080)=0x19, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, 0x0, &(0x7f00000000c0)) 17:19:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x8, 0x4, 0x20000000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff}) openat$cgroup_procs(r1, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) 17:19:29 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="7b0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:29 executing program 5: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="180000001e00010300000000000000320000005900000000746d7bd5dc1efd917f9b0ad9b212242a86690d3081d366cb099474f6a9a104089a55a273b0366f5e2f13fce4ee12ab9d1b13828f0065048c06c387e344ec05f0d67fa92ea66a989ee10314beda36894a253e97fbb7909678ab296eb4525b6d4d771dbd4ba41fd3bdba18a77005d6657a8e9e4558678474ea258618382b3702632e270efbbe2c31bec33530c0f8fb16525c310853dd18ee40aeecb58e38814f63ab0fb416e748db447e3c1f6f54e3603230787f4cc55e6918a3596340c95608a436"], 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000005c0)={&(0x7f0000000240)={0x378, r2, 0x220, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe35}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xac69}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x75}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6026}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x400}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @mcast1, 0x31d6}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @remote, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x101}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @mcast2, 0x8000}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5c1}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6000000000}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xc4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbdd6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}]}]}]}, 0x378}, 0x1, 0x0, 0x0, 0x4044000}, 0x20000000) 17:19:29 executing program 1 (fault-call:9 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x6, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 17:19:29 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:29 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x9eaa, @ipv4={[], [], @empty}, 0xcb4}, {0xa, 0x4e23, 0x1ff, @remote, 0xfb3c}, 0x7ad6, [0xfffffffffffff531, 0x1f, 0x7, 0x2, 0x9, 0x8000, 0x9756, 0x5]}, 0x5c) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r1, 0x104, 0xfffffffffffffff7, 0x0, &(0x7f0000000100)) 17:19:29 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2142.577903][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:29 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000240)="56e9d00e53d9a3cad9808fe2947a87ffa66a79ea25a9e1becea1ef7facd973740cf743fa8d897eee22f3535b43125ed1068ffb02307a815611a465a989abfdbbc1b3776765d5f8f65ed71325f0d7e7b9b7456b3ef5fcc1abc8c56bab5805a36268a5591d5279e3cfd515cd211662449d3c3c332edaa40ea727de0f2ed27a985429cb1c0d42b7c06f12efc04c7a8761487f1f205c2fe11a6f71ce8ff96c846cb7fe976efb1af14af630f524567b5c74132c25bc9d39d3a424e50b", 0xba) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = accept(r0, &(0x7f0000000300)=@nfc, &(0x7f0000000380)=0x80) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000780)=0x1, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r4, 0x1, 0x22, &(0x7f00000000c0)=0x1, 0xfd41) write$binfmt_elf32(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000006dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002240)=""/103, 0x67}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@add_del={0x3, &(0x7f00000000c0)='ifb0\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @local}, {0x0, @remote}, 0xa, {0x2, 0x0, @loopback}, 'erspan0\x00'}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@get={0x1, &(0x7f0000000000)=""/93, 0x1f}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000200)=0x30) r5 = socket$netlink(0x10, 0x3, 0x16) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) recvmmsg(r3, &(0x7f0000002040)=[{{&(0x7f0000000a80)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000b00)=""/137, 0x89}, {&(0x7f0000000bc0)=""/2, 0x2}, {&(0x7f0000000c00)=""/4096, 0x1000}], 0x3, &(0x7f0000001c40)=""/44, 0x2c}, 0x100}, {{&(0x7f0000001c80)=@tipc=@id, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d00)=""/234, 0xea}], 0x1, &(0x7f0000001e40)=""/123, 0x7b}, 0x1000}, {{&(0x7f0000001ec0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001f40)=""/135, 0x87}], 0x1}, 0x80}], 0x3, 0x2000, &(0x7f0000002100)={0x0, 0x989680}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='vxcan1\x00', 0x10) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000021c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002940)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000002c80)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002c40)={&(0x7f0000002980)={0x298, r6, 0x400, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r8}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x53b}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffc00}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x1ac, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3aa8}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}]}, 0x298}, 0x1, 0x0, 0x0, 0x4001}, 0x845) [ 2142.626957][T26669] FAULT_INJECTION: forcing a failure. [ 2142.626957][T26669] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.692751][T26669] CPU: 1 PID: 26669 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2142.700347][T26669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2142.710408][T26669] Call Trace: [ 2142.713715][T26669] dump_stack+0x172/0x1f0 [ 2142.718063][T26669] should_fail.cold+0xa/0x15 [ 2142.722673][T26669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2142.728503][T26669] ? ___might_sleep+0x163/0x280 [ 2142.733369][T26669] __should_failslab+0x121/0x190 [ 2142.738323][T26669] should_failslab+0x9/0x14 [ 2142.742840][T26669] kmem_cache_alloc_node_trace+0x270/0x720 [ 2142.742868][T26669] __kmalloc_node_track_caller+0x3d/0x70 [ 2142.742891][T26669] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2142.759688][T26669] __alloc_skb+0x10b/0x5e0 [ 2142.759707][T26669] ? skb_trim+0x190/0x190 [ 2142.759728][T26669] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2142.774267][T26669] ? tcp_enter_memory_pressure+0x130/0x130 [ 2142.780086][T26669] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2142.785925][T26669] sk_stream_alloc_skb+0x326/0xd80 [ 2142.791062][T26669] do_tcp_sendpages+0xafa/0x1b70 [ 2142.796028][T26669] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2142.801300][T26681] IPVS: length: 194 != 8 [ 2142.801337][T26669] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2142.811322][T26669] tls_push_sg+0x1de/0x680 [ 2142.815765][T26669] tls_tx_records+0x3c8/0x760 [ 2142.820469][T26669] tls_push_record+0x1f67/0x3580 [ 2142.825449][T26669] ? tls_tx_records+0x760/0x760 [ 2142.830326][T26669] ? lock_downgrade+0x880/0x880 [ 2142.835190][T26669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.841443][T26669] ? kasan_check_read+0x11/0x20 [ 2142.846318][T26669] bpf_exec_tx_verdict+0xe30/0x1280 [ 2142.851539][T26669] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2142.857272][T26669] ? tls_push_record+0x3580/0x3580 [ 2142.862459][T26669] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2142.868721][T26669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.875066][T26669] ? sk_msg_alloc+0x62d/0x8d0 [ 2142.879770][T26669] tls_sw_sendmsg+0x107c/0x17b0 [ 2142.884667][T26669] ? tx_work_handler+0xf0/0xf0 [ 2142.889444][T26669] ? aa_sk_perm+0x288/0x880 [ 2142.894058][T26669] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2142.899629][T26669] inet_sendmsg+0x147/0x5e0 [ 2142.904160][T26669] ? ipip_gro_receive+0x100/0x100 [ 2142.909211][T26669] sock_sendmsg+0xf2/0x170 [ 2142.913657][T26669] __sys_sendto+0x262/0x380 [ 2142.918183][T26669] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2142.923666][T26669] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2142.929264][T26669] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2142.935512][T26669] ? fput_many+0x12c/0x1a0 [ 2142.939947][T26669] ? fput+0x1b/0x20 [ 2142.943781][T26669] ? ksys_write+0x1cf/0x290 [ 2142.948304][T26669] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2142.953774][T26669] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2142.959246][T26669] ? do_syscall_64+0x26/0x680 [ 2142.963935][T26669] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2142.963959][T26669] __x64_sys_sendto+0xe1/0x1a0 [ 2142.963984][T26669] do_syscall_64+0x103/0x680 [ 2142.979400][T26669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2142.985313][T26669] RIP: 0033:0x458da9 [ 2142.989218][T26669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2143.008839][T26669] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2143.017479][T26669] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2143.025492][T26669] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2143.033507][T26669] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:19:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/194, &(0x7f0000000100)=0xc2) r1 = socket(0xf, 0xa, 0x7) getsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @broadcast}, 0x1d0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000001c0)='erspan0\x00', 0x7, 0xffffffffffffff00, 0x10001}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000280)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='ip6gretap0\x00', 0x10) recvfrom$rose(r1, &(0x7f0000000300)=""/64, 0x40, 0x10000, &(0x7f0000000340)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0x6, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000380)={0x7fff, {{0xa, 0x4e24, 0x1ff, @empty, 0x1}}}, 0x88) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000480)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @local}, {0x2, 0x4e21, @rand_addr=0x3f}, 0x12, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000440)='vlan0\x00', 0x8, 0x0, 0x6}) write$nbd(r1, &(0x7f0000000500)={0x67446698, 0x0, 0x4, 0x2, 0x1, "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"}, 0x1010) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000001540)=0x10001) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001600)={0x0, 0x7560, 0x1, [0x291c]}, &(0x7f0000001640)=0xa) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000001680)={r2, @in6={{0xa, 0x4e20, 0xec9, @local, 0x10000}}}, 0x84) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000001740)=0xa, 0x4) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000001780)=0x1ff, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000017c0)=0xffffffffffff0000, 0x4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000001800)=0x4, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001840)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000001880)={r2, @in6={{0xa, 0x4e22, 0xfffffffffffffffa, @rand_addr="5b3626bc928374404509c9d29596e1b2", 0x9}}, 0x7, 0x10001, 0x4, 0x8fd, 0x7f}, &(0x7f0000001940)=0x98) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000019c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000001a80)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001a40)={&(0x7f0000001a00)={0x1c, r3, 0x102, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x40000) socket$inet6(0xa, 0x4, 0x40) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000001ac0), 0x4) setsockopt$ax25_int(r1, 0x101, 0x2, &(0x7f0000001b00)=0x502, 0x4) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000001b40)=0x7, 0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000001b80)={0x1, {{0xa, 0x4e21, 0x1, @mcast1, 0x1f}}, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000}}}, 0x108) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001d00)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000001e00)={&(0x7f0000001cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001dc0)={&(0x7f0000001d40)={0x64, r4, 0x901, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffbff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x21}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x46f}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1e9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8040}, 0x8041) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001e40)={r0}) 17:19:30 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r0 = socket$inet(0x2, 0x3, 0xa) r1 = accept4(r0, &(0x7f0000000180)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @remote, @null, @bcast, @null, @rose]}, &(0x7f0000000100)=0x80, 0x800) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000200)=0x4) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="1f010002ac1414aa000000002bb701000000ac5414aae153efd33700701e738537429af615d2dea9ca3f30dc715cf38cbca4db2534017c9d5b22"], 0x14) write$binfmt_misc(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x19) close(r0) 17:19:30 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0xfffffffffffffe3d) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000200)) ioctl(r1, 0x1000, &(0x7f0000000240)) 17:19:30 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000), 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$tipc(r0, &(0x7f0000000080)=@name, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r3, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x3fb}}, 0x0) [ 2143.041502][T26669] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2143.049483][T26669] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="7c0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0x2c, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x800000000000}, 0x6}, 0x70) 17:19:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, 0x0, 0x0) connect$inet(r1, &(0x7f0000000800)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x4, 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89f8, &(0x7f0000000040)="16702fa1d1661c") getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@remote, @in6=@remote, 0x4e20, 0x2b4, 0x4e24, 0x3593, 0xa, 0xa0, 0x20, 0x7f, r2, r3}, {0x6, 0x39, 0x7, 0x1a9, 0xfffffffffffffff7, 0x5, 0x2, 0x5}, {0x101, 0x0, 0x0, 0x2b}, 0xffff, 0x6e6bb4, 0x0, 0x1}, {{@in=@rand_addr=0x3ff, 0x4d4, 0x7c}, 0x0, @in=@empty, 0x3503, 0x4, 0x2, 0x7f, 0x1, 0x4, 0x5}}, 0xe8) 17:19:31 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:31 executing program 1 (fault-call:9 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x394) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000001c0)={0x6, 0x6}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460bd75923000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800"/120], 0x8356) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 2144.208664][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:31 executing program 5: r0 = socket(0x1000004000000010, 0x80802, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$inet6(0xa, 0x4805, 0x8) r3 = accept4$x25(0xffffffffffffffff, &(0x7f0000000180)={0x9, @remote}, &(0x7f0000000200)=0x12, 0x80000) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f00000002c0)={0x8, "f830c2081a7913d2b95b30427b584fcf140b976112041802fa13d5b49aba1db172f6df80b20cff80d50dcf5abe7ca2dc1f4ef282e2aa95155783958a1c6176d2c7ce911f71309765a06de04127619ddf636443123a1543b9d1a6d233adb9ac58a211ce569bba96a1128acf868b1042d6193934b102c5b1ea244dfe51850a5da9"}) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f00000005c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x8}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={0x0, r4, 0x6, 0x1}, 0x20bae0a5cc1def7b) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000040)={'nim0\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2}) ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f00000000c0)) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f00000004c0)={@local, @remote, 0x0}, &(0x7f0000000540)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="688c3aa5a34639000000240000032abd7000fedbdf2500000000", @ANYRES32=r6, @ANYBLOB="f2ff0d000f00fffff7ff05000800050000060000080001006362710034000200100002004e050301000000801201000010000500f401000009000400f7ffffff1000020000011007000200007a000000"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x1) bind$inet(r5, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r5, 0x1, 0xd, &(0x7f0000000100)=0x8, 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000500)=ANY=[@ANYBLOB="72df8f2b69"], 0xe) shutdown(r2, 0x1) sendto$inet(r5, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) getsockopt$inet_tcp_int(r5, 0x6, 0x12, &(0x7f00000001c0), &(0x7f0000000140)=0x4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4c0}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r7, 0x4, 0x70bd26, 0x25dfdbfb}, 0x1c}}, 0x0) sendto$inet(r5, &(0x7f0000000180), 0x8a97011c9ac3ef6f, 0x4007ffd, 0x0, 0xb4) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000000)) write(r0, &(0x7f00000010c0)="2400000058001f02ff07f4f9002304000a04f511082001000201000207000280010c0000", 0x24) [ 2144.249558][T26708] FAULT_INJECTION: forcing a failure. [ 2144.249558][T26708] name failslab, interval 1, probability 0, space 0, times 0 17:19:31 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2144.332500][T26708] CPU: 0 PID: 26708 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2144.340103][T26708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2144.350641][T26708] Call Trace: [ 2144.353958][T26708] dump_stack+0x172/0x1f0 [ 2144.358314][T26708] should_fail.cold+0xa/0x15 [ 2144.362937][T26708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2144.368764][T26708] ? ___might_sleep+0x163/0x280 [ 2144.373636][T26708] __should_failslab+0x121/0x190 [ 2144.373652][T26708] should_failslab+0x9/0x14 [ 2144.373668][T26708] __kmalloc+0x2dc/0x740 [ 2144.373684][T26708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2144.373701][T26708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2144.373721][T26708] ? tls_get_rec+0x104/0x590 [ 2144.404447][T26708] tls_get_rec+0x104/0x590 [ 2144.408899][T26708] tls_sw_sendmsg+0xda5/0x17b0 [ 2144.413703][T26708] ? tx_work_handler+0xf0/0xf0 [ 2144.418498][T26708] ? aa_sk_perm+0x288/0x880 [ 2144.423140][T26708] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2144.428718][T26708] inet_sendmsg+0x147/0x5e0 17:19:31 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2144.433244][T26708] ? ipip_gro_receive+0x100/0x100 [ 2144.438297][T26708] sock_sendmsg+0xf2/0x170 [ 2144.442732][T26708] __sys_sendto+0x262/0x380 [ 2144.447264][T26708] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2144.452671][T26708] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2144.458250][T26708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2144.464507][T26708] ? fput_many+0x12c/0x1a0 [ 2144.468935][T26708] ? fput+0x1b/0x20 [ 2144.472757][T26708] ? ksys_write+0x1cf/0x290 [ 2144.477307][T26708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2144.482795][T26708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2144.488276][T26708] ? do_syscall_64+0x26/0x680 [ 2144.492975][T26708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2144.499065][T26708] __x64_sys_sendto+0xe1/0x1a0 [ 2144.503859][T26708] do_syscall_64+0x103/0x680 [ 2144.503882][T26708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2144.503894][T26708] RIP: 0033:0x458da9 [ 2144.503909][T26708] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2144.503917][T26708] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2144.503931][T26708] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2144.503940][T26708] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2144.503948][T26708] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2144.503956][T26708] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000380), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={0x1, @bcast, @rose={'rose', 0x0}, 0x0, 'syz0\x00', @default, 0x3f, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @null, @null]}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="d2", 0x1}], 0x1, &(0x7f0000000200)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x4, 0x7fff, 0x100000001}}, @init={0x18, 0x84, 0x0, {0x8, 0x1, 0x2, 0x8a6}}, @init={0x18, 0x84, 0x0, {0x2, 0x1, 0x10000, 0x8c7}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}], 0x70}, 0x0) r3 = socket(0xa, 0x3, 0x3c7d) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x3, 0x208, 0x7fffffff, 0x0, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000140)={r4, 0x0, 0x88}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="2000000000000000840000000200090000004102000000000000edff6ddbc47e516f3312f385dcf1adfb8d33136622f910b2c0f221b419df458e2da964511b0c0d3e1b70c36e093a1ba4268214608c8a35343c4332f47a1c36175a79bab117f3fefc11ad31d8b478769c3e0fd79724c180ddc09d61f02d382b5ef4d092a91c121774f6ba59a5c62e3154885fb9d5b7196cfe91db7b8a94ef97de6e53c7c23416e8447e7edd5fbd4a0c1920fcb66d3a", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0x0) 17:19:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001900010300000000000000001f00000014001600fe8000000000000000000000000000aa3bfc49c77039773ebbf292fbee28147c677771972266af3bf27c0f220f0d7f0d81bfebceb7a0807549d8c8f229381f5c6689c6f32ecc60"], 0x1}}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e20, @broadcast}, 0x10) [ 2144.503965][T26708] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0xfffffffffffffffe) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x5}, 0x64) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @broadcast}, &(0x7f00000000c0)=0xc) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) close(r0) 17:19:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="7d0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e0000001ee000000000000000a004000"], 0x10) 17:19:32 executing program 1 (fault-call:9 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:32 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='bridge_slave_1\x00'}) r1 = socket(0x11, 0x0, 0x7) connect$pppoe(r1, &(0x7f0000003f00)={0x18, 0x0, {0x1, @random="5133660609d5", 'nr0\x00'}}, 0x1e) 17:19:32 executing program 2: 17:19:32 executing program 4: 17:19:32 executing program 5: [ 2145.484740][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:32 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2145.535974][T26757] FAULT_INJECTION: forcing a failure. [ 2145.535974][T26757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2145.614622][T26757] CPU: 0 PID: 26757 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2145.622222][T26757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2145.632302][T26757] Call Trace: [ 2145.635632][T26757] dump_stack+0x172/0x1f0 [ 2145.639990][T26757] should_fail.cold+0xa/0x15 [ 2145.644631][T26757] ? __sys_sendto+0x262/0x380 [ 2145.649329][T26757] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2145.655248][T26757] should_fail_alloc_page+0x50/0x60 [ 2145.660458][T26757] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2145.665849][T26757] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2145.671509][T26757] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2145.677248][T26757] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2145.682908][T26757] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2145.689167][T26757] alloc_pages_current+0x107/0x210 [ 2145.694313][T26757] skb_page_frag_refill+0x277/0x460 [ 2145.699535][T26757] sk_page_frag_refill+0x55/0x1f0 [ 2145.704576][T26757] sk_msg_alloc+0x10e/0x8d0 [ 2145.709126][T26757] tls_sw_sendmsg+0x63c/0x17b0 [ 2145.713920][T26757] ? tx_work_handler+0xf0/0xf0 [ 2145.718699][T26757] ? aa_sk_perm+0x288/0x880 [ 2145.723232][T26757] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2145.728793][T26757] inet_sendmsg+0x147/0x5e0 [ 2145.733315][T26757] ? ipip_gro_receive+0x100/0x100 [ 2145.738360][T26757] sock_sendmsg+0xf2/0x170 [ 2145.742830][T26757] __sys_sendto+0x262/0x380 [ 2145.747343][T26757] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2145.752731][T26757] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2145.758340][T26757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 17:19:33 executing program 2: 17:19:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0xffffffd5) write(r2, &(0x7f0000000540)="aa", 0x1) [ 2145.764600][T26757] ? fput_many+0x12c/0x1a0 [ 2145.764620][T26757] ? fput+0x1b/0x20 [ 2145.764632][T26757] ? ksys_write+0x1cf/0x290 [ 2145.764651][T26757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2145.764665][T26757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2145.764679][T26757] ? do_syscall_64+0x26/0x680 [ 2145.764696][T26757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2145.764718][T26757] __x64_sys_sendto+0xe1/0x1a0 [ 2145.764738][T26757] do_syscall_64+0x103/0x680 [ 2145.764757][T26757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2145.764769][T26757] RIP: 0033:0x458da9 [ 2145.764789][T26757] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2145.782927][T26757] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2145.782944][T26757] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2145.782953][T26757] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 17:19:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x5}, 0x1c) listen(r1, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xb0, 0x20000084, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) socket$inet_udplite(0x2, 0x2, 0x88) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x4) socket$inet6(0xa, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xffffffffffffff03, 0x0, 0x0, 0x35) [ 2145.782961][T26757] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2145.782969][T26757] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2145.782976][T26757] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2145.812385][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2145.855678][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2145.855792][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.508558][ T27] audit: type=1800 audit(1558113573.759:369): pid=26775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="cgroup.events" dev="sda1" ino=16929 res=0 17:19:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="7e0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:34 executing program 1 (fault-call:9 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x3c, "0f82db28593f7c4b759717b61fcd821a67c0e3c65ebccc70f118f17ee2a315d5a39f2c91cb02af48b74c4a6156147630a18b7da266db0552628b0ebe"}, &(0x7f0000000080)=0x44) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x7d, &(0x7f00000001c0)={0xff0f, 0x0, 0x0, 0x0, r1}, &(0x7f0000000200)=0x10) 17:19:34 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x3) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "4fffb9378660d98b", "cc48459dce2006eb01128fe568be69d6", "2f13ba6e", "f5ccf1374764767c"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r0) 17:19:34 executing program 5: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept(r1, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000140)=0x80) r3 = openat$cgroup_ro(r1, &(0x7f00000007c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000800)={r0, r3}) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x22, 0x847}, 0x14}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f000000060000002805000000010000c0013b430c0c0161da00c0010000e8020000c0010000900400009004000090040000900400009004000006000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/96], @ANYBLOB="00000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c00000010000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000080000000000000040005450524f585900000000000000000000000000000000000000000000000102000000ffffffffe00000010000000000000000000000004e22000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c0000000000000000000000000000000000000000000000000002800544f5300000000000000000000000000000000000000000000000000000009c900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000e800280100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000600000008000000020000000200000040005450524f5859000000000000000000000000000000000000000000000001010000000900000000000000000000000000ffffac1414bb4e20000000000000e0000001e0000002ff00000000000000736974300000000000000000000000006263736630000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010001120000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000200000000000000280045434e0000000000000000000000000000000000000000000000000000002006030000000000ffffffffac1e0001ff000000000000006263736830000000000000000000000073797a6b616c6c657231000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00020800000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e0000000000000000000000000000000000000000000000000000000108000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x588) 17:19:34 executing program 5: r0 = socket$inet6(0xa, 0x200000006, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$inet(r1, &(0x7f0000000380)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = accept(r0, 0x0, &(0x7f00000003c0)) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000200)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr, 0x200}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x44, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0xfffffffffffffe2f) socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000280)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000400)="7c9c9377484fbba5e9b542b97578bcc31dee8a7f98d6646dd86a7190a1b959", 0x1f) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="baa21c59c4d352ad56a85b4048b0d1605e2008c21950ab229af4e18ee08de6d17348b46d1de5497bfd0ef4e88a20647962a69336b46be7e40dbba1a0899cb5083c94e024f42edb0a50a3359ad1d30e04f41669d91445b4bed397340e9ad966a46a9203cfab8bb8ac3572daafe04569b4b813e87856d192fac18ac79a6103e993"], 0x80) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfffffcbe) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="323900009ea59d5140a72927811157fc745dc13f07f636e4006f90832624fd691f"], 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r4, r1, 0xf, 0x2}, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000240)=0x14, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) recvmmsg(r5, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 2146.946684][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2146.971885][T26806] FAULT_INJECTION: forcing a failure. [ 2146.971885][T26806] name failslab, interval 1, probability 0, space 0, times 0 [ 2146.993098][T26806] CPU: 1 PID: 26806 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2147.000698][T26806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2147.010776][T26806] Call Trace: [ 2147.014084][T26806] dump_stack+0x172/0x1f0 [ 2147.018447][T26806] should_fail.cold+0xa/0x15 [ 2147.023056][T26806] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2147.028889][T26806] ? ___might_sleep+0x163/0x280 [ 2147.033848][T26806] __should_failslab+0x121/0x190 [ 2147.038804][T26806] should_failslab+0x9/0x14 [ 2147.043346][T26806] __kmalloc+0x2dc/0x740 [ 2147.047610][T26806] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2147.053866][T26806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2147.053879][T26806] ? tls_get_rec+0x104/0x590 [ 2147.053894][T26806] tls_get_rec+0x104/0x590 [ 2147.053913][T26806] tls_sw_sendmsg+0xda5/0x17b0 [ 2147.053945][T26806] ? tx_work_handler+0xf0/0xf0 [ 2147.078711][T26806] ? aa_sk_perm+0x288/0x880 [ 2147.083238][T26806] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2147.088807][T26806] inet_sendmsg+0x147/0x5e0 [ 2147.093319][T26806] ? ipip_gro_receive+0x100/0x100 [ 2147.098357][T26806] sock_sendmsg+0xf2/0x170 [ 2147.102792][T26806] __sys_sendto+0x262/0x380 [ 2147.107310][T26806] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2147.112691][T26806] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2147.112718][T26806] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2147.112731][T26806] ? fput_many+0x12c/0x1a0 [ 2147.112748][T26806] ? fput+0x1b/0x20 [ 2147.112761][T26806] ? ksys_write+0x1cf/0x290 [ 2147.112783][T26806] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2147.142739][T26806] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2147.148211][T26806] ? do_syscall_64+0x26/0x680 [ 2147.152898][T26806] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2147.158976][T26806] __x64_sys_sendto+0xe1/0x1a0 [ 2147.163757][T26806] do_syscall_64+0x103/0x680 [ 2147.168358][T26806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2147.174288][T26806] RIP: 0033:0x458da9 [ 2147.178203][T26806] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:19:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mem_exclusive\x00\x9b#\x009\x91\xbf\xfa\xe5\xa5)\xd8) V\xd9\x7f$ \x1a\x01\xfexB|\xd8M\xf5\xf5\xcf\x9c\x89B\xcc\xca\xa7&j\x01\x97\xde\x87\xda\x8fnr;Q?\xf4\xf5[\xa4\x85MI\xf4\xa2\xbb\xf8\x99\x1c\x02\xfa\xcfy\xf8\xdf\x00\x00\x00\x00\xad=T\xb1\xd1\x86~/\x16{sV\xf9\xc5\xd9\xfc\x82\aw\x85\x06\xb3\xa7\x95\xf6\xb3v\x97\x94>RQOSzRB\x17\x9a\x03\xc3\x95\xf9\xfa\xcf<\xf4\x152\x91ft\xee4\x95 \x97&(\xaff_\x95\x9dg`X\xac\xc6\xc6\xa7\xdf\x054\xf4<\x8d:\xdbmF\xb1\x9aI[\x18~\xed\r\xf4\x9b\f\x94(9g\xef\xf6\a\xcd\x01A\x8e\x84\x04\x8d\x00\xa7\x7f\xa1\xdbo\xc8V\xe0j\xc1\xf7\xdb\xac\x8a\xbd\x1e\x01\xd8\xd7UI\x83\xed\xee\xef\x1f\xbf\xab;\x1e\xa8\xde\xff\xab\xb9&A\x96I\xf8\xdbO\x96\x1c/Q\x04\x00\x00\x00\x00\x00\x00\x00\xe8\xf497r\xce{(jY$\xc5L\xc5\xc5\xee\fp\x14IT\xf4\xce5>\xfc\x14\xba\x19\xe2\x10\xe3\xec\xbeze\xab(\x1b!\x941\x062\x83\xbb\xd4\xc1\xa5\xb6$\xf7\x1f\xb8s\xc3\xe4H\x1e\xe9Ok9Z\xab\x9f\x19\xc3V\xa8S\xf4o\xa84\x8aj\xb9\xe7\x11jqK\xa2-\xb9}\xe7', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x3) 17:19:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x81, "8ada84305e1b618f7fad33190b35a69fc2f61aa76b63f05bd8cfcc576ac6581ef1a853dd81483afbd8c10e1b23871da62853fef99ab390d3e69f435a528cc515c5379e079bcc7afbd3210bcea2ab645e0e060e8fa966fbf48368179573d3d360cc0ad471d6f4b0cdefbe61ca548b983c39fae7e8589b3e3404ccfb1d51dd948068"}, &(0x7f00000000c0)=0xa5) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x5, 0x0, 0x0) 17:19:34 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2147.197830][T26806] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2147.206267][T26806] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2147.214262][T26806] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2147.222249][T26806] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2147.230240][T26806] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2147.238238][T26806] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) write(r0, &(0x7f0000000080)="240000001a0025f0006bff140c0a0b5aff6e10b500000780cc08001c0006000000120ddbd5ba3716335dbec0e018486c076a1d53e9718f1e501d8617304e6c989e7ae1b844841938242eba7a80554336aaa4af8c131fcd84eeb621f3ad0c02d105b5282425ae9224fee433e65e0f6f5c8422c5a7479219a5b8a9263ddba93a4a2841fca979daae47b4a198e9195e9cdeccab51952f5f98a5c6f8779b5f57aad0d1ae10a5e06ebc7ef5a517efe19e49590a224942105fefc5e6006622c72fbfc60a88f747cbb856d5a87532ce2c3bc95d004aa6b3b48350", 0xffffffffffffff43) 17:19:34 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2147.455705][ T27] audit: type=1804 audit(1558113574.709:370): pid=26813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir676603611/syzkaller.gUUSUU/4103/memory.events" dev="sda1" ino=16817 res=1 [ 2148.111660][ T27] audit: type=1804 audit(1558113575.359:371): pid=26814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir676603611/syzkaller.gUUSUU/4103/memory.events" dev="sda1" ino=16817 res=1 17:19:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x40000000015, 0x5, 0x4) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x23f) sendto$llc(r1, &(0x7f0000000080)="a9b1952290fb5af0111e6afd7e8027af69612dc5f19d99c03bec5061f1007430d5810484a21a7af72ed633e75009d640b50219c6a2037456d8eca47dd7cd2c87cc5adece614fce4380430004a051219fbf766ad847a06177a43673e7ff629c72e790399018e6904c4eec91b01303be5593154b146aaeb98cff811311c82a53e7c54e7efd97ed821e01563e2361601614bd5437857b05cf1513cf5f898ed8aa60100d3270ace5871adb280b74cc8d0a5f24505d75a0d154895d", 0xb9, 0x4000801, 0x0, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000040)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) getuid() setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000001180)=0x3, 0x4) sendmsg$nl_netfilter(r1, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x40000) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) sendto$rxrpc(r1, &(0x7f0000000140)="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", 0x1000, 0x4000000, &(0x7f0000001140)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0xc52, @empty, 0x2}}, 0x24) 17:19:35 executing program 1 (fault-call:9 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:35 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:35 executing program 2: r0 = socket(0x2, 0x395546063bbbcd09, 0x101) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f0000000140)="2400000022001f0214f9f407008000000000000110000400feffffff0800000000000000", 0x24) 17:19:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="7f0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:35 executing program 5: r0 = socket$inet6(0xa, 0x200000006, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$inet(r1, &(0x7f0000000380)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = accept(r0, 0x0, &(0x7f00000003c0)) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000200)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr, 0x200}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x44, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0xfffffffffffffe2f) socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000280)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000400)="7c9c9377484fbba5e9b542b97578bcc31dee8a7f98d6646dd86a7190a1b959", 0x1f) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="baa21c59c4d352ad56a85b4048b0d1605e2008c21950ab229af4e18ee08de6d17348b46d1de5497bfd0ef4e88a20647962a69336b46be7e40dbba1a0899cb5083c94e024f42edb0a50a3359ad1d30e04f41669d91445b4bed397340e9ad966a46a9203cfab8bb8ac3572daafe04569b4b813e87856d192fac18ac79a6103e993"], 0x80) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfffffcbe) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="323900009ea59d5140a72927811157fc745dc13f07f636e4006f90832624fd691f"], 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r4, r1, 0xf, 0x2}, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000240)=0x14, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) recvmmsg(r5, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 17:19:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x801) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x7) [ 2148.277564][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:35 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2148.323469][T26849] FAULT_INJECTION: forcing a failure. [ 2148.323469][T26849] name failslab, interval 1, probability 0, space 0, times 0 [ 2148.372917][T26849] CPU: 0 PID: 26849 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2148.380511][T26849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2148.380529][T26849] Call Trace: [ 2148.393927][T26849] dump_stack+0x172/0x1f0 [ 2148.398285][T26849] should_fail.cold+0xa/0x15 [ 2148.402896][T26849] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2148.408750][T26849] ? ___might_sleep+0x163/0x280 [ 2148.413643][T26849] __should_failslab+0x121/0x190 [ 2148.418637][T26849] should_failslab+0x9/0x14 [ 2148.423319][T26849] kmem_cache_alloc_node+0x264/0x710 [ 2148.428647][T26849] __alloc_skb+0xd5/0x5e0 [ 2148.428665][T26849] ? skb_trim+0x190/0x190 [ 2148.428679][T26849] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2148.428691][T26849] ? tcp_enter_memory_pressure+0x130/0x130 [ 2148.428704][T26849] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2148.428723][T26849] sk_stream_alloc_skb+0x326/0xd80 [ 2148.428742][T26849] do_tcp_sendpages+0xafa/0x1b70 [ 2148.428773][T26849] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2148.428798][T26849] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2148.428825][T26849] tls_push_sg+0x1de/0x680 [ 2148.480248][T26849] tls_tx_records+0x3c8/0x760 [ 2148.485856][T26849] tls_push_record+0x1f67/0x3580 [ 2148.490826][T26849] ? tls_tx_records+0x760/0x760 [ 2148.495702][T26849] ? lock_downgrade+0x880/0x880 [ 2148.500579][T26849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.506867][T26849] ? kasan_check_read+0x11/0x20 [ 2148.511745][T26849] bpf_exec_tx_verdict+0xe30/0x1280 [ 2148.516973][T26849] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2148.522720][T26849] ? tls_push_record+0x3580/0x3580 [ 2148.527931][T26849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2148.534194][T26849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2148.540474][T26849] ? sk_msg_alloc+0x62d/0x8d0 [ 2148.545190][T26849] tls_sw_sendmsg+0x107c/0x17b0 [ 2148.550090][T26849] ? tx_work_handler+0xf0/0xf0 [ 2148.554898][T26849] ? aa_sk_perm+0x288/0x880 [ 2148.559441][T26849] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2148.565017][T26849] inet_sendmsg+0x147/0x5e0 17:19:35 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2148.569540][T26849] ? ipip_gro_receive+0x100/0x100 [ 2148.574621][T26849] sock_sendmsg+0xf2/0x170 [ 2148.579057][T26849] __sys_sendto+0x262/0x380 [ 2148.583586][T26849] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2148.588999][T26849] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2148.594579][T26849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2148.600845][T26849] ? fput_many+0x12c/0x1a0 [ 2148.605296][T26849] ? fput+0x1b/0x20 [ 2148.605309][T26849] ? ksys_write+0x1cf/0x290 [ 2148.605327][T26849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.605340][T26849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.605354][T26849] ? do_syscall_64+0x26/0x680 [ 2148.605371][T26849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2148.605392][T26849] __x64_sys_sendto+0xe1/0x1a0 [ 2148.605413][T26849] do_syscall_64+0x103/0x680 [ 2148.605431][T26849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2148.605441][T26849] RIP: 0033:0x458da9 [ 2148.605455][T26849] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2148.605462][T26849] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2148.605474][T26849] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2148.605482][T26849] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2148.605490][T26849] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2148.605499][T26849] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2148.605507][T26849] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:36 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:36 executing program 4: r0 = socket(0x15, 0x80005, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x100000, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfec0, 0x0, 0x0, 0x0, 0x0, 0x3e], [], @broadcast}}, 0x1c) [ 2148.605801][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2148.610035][ T27] audit: type=1804 audit(1558113575.809:372): pid=26866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir676603611/syzkaller.gUUSUU/4104/memory.events" dev="sda1" ino=17185 res=1 [ 2148.613958][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:36 executing program 1 (fault-call:9 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:36 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:36 executing program 4: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) sendmsg$unix(r2, &(0x7f0000000480)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000180)="2ad4", 0x2}], 0x1, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}], 0x20}, 0x24044051) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'ip6gretap0\x00', 0x8cd}) unshare(0x2000400) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) [ 2149.010212][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2149.026229][T26881] FAULT_INJECTION: forcing a failure. [ 2149.026229][T26881] name failslab, interval 1, probability 0, space 0, times 0 [ 2149.087962][T26881] CPU: 0 PID: 26881 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2149.095736][T26881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2149.105820][T26881] Call Trace: [ 2149.109148][T26881] dump_stack+0x172/0x1f0 [ 2149.113612][T26881] should_fail.cold+0xa/0x15 [ 2149.118240][T26881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2149.124089][T26881] ? ___might_sleep+0x163/0x280 [ 2149.128962][T26881] __should_failslab+0x121/0x190 17:19:36 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0), 0x0) r0 = socket(0xa, 0xa, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x7, 0x80000001, 0x594}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={r1, 0x2ef9, 0x1, 0xfff, 0x100, 0x2}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x78}, 0x8) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x5c, r2, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xef}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xa}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48000}, 0x20040800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 2149.133928][T26881] should_failslab+0x9/0x14 [ 2149.138561][T26881] kmem_cache_alloc_node_trace+0x270/0x720 [ 2149.144422][T26881] __kmalloc_node_track_caller+0x3d/0x70 [ 2149.150075][T26881] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2149.155469][T26881] __alloc_skb+0x10b/0x5e0 [ 2149.159913][T26881] ? skb_trim+0x190/0x190 [ 2149.164259][T26881] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2149.169998][T26881] ? tcp_enter_memory_pressure+0x130/0x130 [ 2149.175835][T26881] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2149.181766][T26881] sk_stream_alloc_skb+0x326/0xd80 [ 2149.186927][T26881] do_tcp_sendpages+0xafa/0x1b70 [ 2149.191916][T26881] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2149.197231][T26881] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2149.202983][T26881] tls_push_sg+0x1de/0x680 [ 2149.207442][T26881] tls_tx_records+0x3c8/0x760 [ 2149.212241][T26881] tls_push_record+0x1f67/0x3580 [ 2149.217329][T26881] ? tls_tx_records+0x760/0x760 [ 2149.222221][T26881] ? lock_downgrade+0x880/0x880 [ 2149.227118][T26881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.233473][T26881] ? kasan_check_read+0x11/0x20 [ 2149.238380][T26881] bpf_exec_tx_verdict+0xe30/0x1280 [ 2149.243635][T26881] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2149.249482][T26881] ? tls_push_record+0x3580/0x3580 [ 2149.254715][T26881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2149.260978][T26881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2149.267504][T26881] ? sk_msg_alloc+0x62d/0x8d0 [ 2149.272299][T26881] tls_sw_sendmsg+0x107c/0x17b0 [ 2149.277195][T26881] ? tx_work_handler+0xf0/0xf0 [ 2149.282008][T26881] ? aa_sk_perm+0x288/0x880 [ 2149.286542][T26881] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2149.292163][T26881] inet_sendmsg+0x147/0x5e0 [ 2149.297479][T26881] ? ipip_gro_receive+0x100/0x100 [ 2149.306095][T26881] sock_sendmsg+0xf2/0x170 [ 2149.310718][T26881] __sys_sendto+0x262/0x380 [ 2149.315270][T26881] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2149.320678][T26881] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2149.322551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2149.326440][T26881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2149.338417][T26881] ? fput_many+0x12c/0x1a0 [ 2149.342854][T26881] ? fput+0x1b/0x20 [ 2149.346690][T26881] ? ksys_write+0x1cf/0x290 [ 2149.353725][T26881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2149.359215][T26881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2149.364707][T26881] ? do_syscall_64+0x26/0x680 [ 2149.369606][T26881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2149.375720][T26881] __x64_sys_sendto+0xe1/0x1a0 [ 2149.380625][T26881] do_syscall_64+0x103/0x680 [ 2149.385688][T26881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2149.391626][T26881] RIP: 0033:0x458da9 [ 2149.395544][T26881] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2149.415262][T26881] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2149.423704][T26881] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2149.431706][T26881] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2149.439702][T26881] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2149.447694][T26881] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2149.455689][T26881] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0xb) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x5, 0x4, 0x80) setsockopt$inet_dccp_buf(r4, 0x21, 0x2, &(0x7f00000003c0)="e7c9f08af61b95aa647decd2b1bce4df8c3f7b7a3ec86839d4c57748857671cef51f4e16caa42013f1cb24d77301aa14d45a13050118669cd0290504384bf99837bb888bd78f5f973c1c87057ad88779033f6325d107eaf2b007b26f1acb7c4aee413bbd39762a14a18163a24dbc44ecc32a5fb844c23c16b8227263633b5efb2ea7f7603897200cc7ba845bde8656d5b7bc0d840af71e72e9265e3e44e9e986254038ce60572995afce950b6e9588c397034c4f7a1a637a845a095e528d0cc8a6fa47fcb2fc1ca8a3902b066cc555993345301263d14e17f7", 0xd9) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000380)={'veth1\x00', &(0x7f0000000280)=@ethtool_rxnfc={0x3f, 0x11, 0x8, {0xf, @ah_ip6_spec={@rand_addr="5b2c9aabdd20990a2d8da84b6fb23a67", @empty, 0x7, 0x40}, {0x0, @random="3efde1361082", 0x100000001, 0xc5, [0x7, 0x800]}, @esp_ip4_spec={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x8000, 0x10000, 0x81}, {0x0, @empty, 0x0, 0x80, [0x5, 0x9]}, 0x9b, 0x5}, 0x9, [0x4, 0x0, 0x0, 0x7c, 0x4, 0xa89f, 0x80000000, 0x6000000, 0x8000]}}) sendmmsg$inet_sctp(r4, &(0x7f0000000a40)=[{&(0x7f00000004c0)=@in6={0xa, 0x4e21, 0x0, @rand_addr="26910fcfbc1d0001b389b6a96ab66eb1", 0x8}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000500)="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", 0xff}], 0x1, 0x0, 0x0, 0x800}, {&(0x7f0000000640)=@in6={0xa, 0x4e21, 0xcf, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000000680)="cf697d569f0d70ed3cf1ea749c3c", 0xe}, {&(0x7f00000006c0)="8da5b85b1be25bffa708c7a0dba14063628c2736543042e275cb1df3eb9481dfb2de317a48ead07e3099d7c861f9faa9c19e916ea562b99c46efbc28dfd3d471c05ca10ab92f1e38cee6144ea7fa", 0x4e}, {&(0x7f0000000740)="b752a0182b7472ae9d788fcf2b00d73faa55f6ed86183e844d404fd6d4f16ef302fd396a68d4530a22d1830eb3f68b2f629d0be5ff6492", 0x37}, {&(0x7f0000000780)="bc5175ea1ce2a7bca416f887d0a9a8c0ff70284909e1b8f85c54496cf82dbd859ac4f41f99a55bd65058bb040eee34a58ccbd7e07107", 0x36}, {&(0x7f00000007c0)="52578b9055822812aaaee4bc67f03379a6cab3cbabf80e80be7024b38eebe9edb599e5dc2ff9eb5095b0e2d0856f461de126f0063e561d83c18ebdcc8e6044f45a986e9135b0", 0x46}, {&(0x7f0000000840)="c9ea0a80b336c72ad8005c015b917d4a4658af14d1beaf7cd6d4b93b74249b4c579e0ad9890f43c250ab164a4e2f6359d3cc271c0906b2b2d955c87fd851c01b649633dd1e7f2407c407f8ccb4b5735a9b5976e40d6faafb31b0b59986f362ac32f10c57fd0e60392c3b37d784450075ba1e477aeb35", 0x76}, {&(0x7f00000008c0)="60ad468ee09165b34f7bba3870b855c3ba45a56ee8946d14a89d3737c64ee1cd1e9a71aa1854c32ae0eee4ff1e0571536b936674a967db2a36b27b1349f4366a8b68a5fa1744e1d6a3a0c156166de7b9307a824f978744a41f2814d0a82fd3ce7cfb5213472a020dcd81cd64e95da1f1ba1e56d29f6d8608f7ff62ebde7cfcafdb564a74f95fb4650028b83f29d8e8e7a1a13f2df6989ed8267ceb6c4e38d5fb3bfcb884fd59fe6daa3c2d3c30bf6113d5bb41bbbbbe863100aad8176c22405cd6cdff51ca245867a235a472a813239f1646b3f3748d4398b324d9967a9a0663c4af0093549114", 0xe7}], 0x7, 0x0, 0x0, 0x4800}], 0x2, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="1a072abd70e773fb00fcdbdf25018000000800f4b784a79d03b6bf646d250200ae000000080006000000000008000280008000000800050003000000908eef00df558ad8de7a563fcc37ea3ae87fc4021f983af60c8b8991f0e1a7c37f3bcc9929b4784cb45d0bbe968b777d25f7d862d2025f61fb6c4c4b6822b80be9fc2ec101d0d074be285b9f25a41312b8524c16af39c5c13da70ee9e7dbdb6d6362a53800bdc98bf001c43694d6079ea19c"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x20040000) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) sendmmsg(r2, &(0x7f00000047c0)=[{{&(0x7f0000004500)=@ethernet={0x0, @local}, 0x3e8, &(0x7f0000004740), 0x3e8}}], 0x209, 0x0) 17:19:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="800200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:37 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = socket(0x1, 0x2, 0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000001c0)={r0, r0, 0x68e, 0xef, &(0x7f00000000c0)="18683da39bbf0286b43ba14c08b7a1abc900dc84ad3e4ad5d433d718f3b289a98198e72c7b8afe99b92e48dbf52b1d7a2a9711d6fd5b8cdaa090231fcd67a3f303aed0cc5c443b6aba224f7ca49fd469fe525cfc32877ac369dd85e39dcfc8fb95dec51fd876a9a1e989b3e724b3247d485a5f65a123682a83da8c02647d95e1e06f2ed10acb53e19dffc344335a5597c6e8889795fbf9dd8af24ce192cff899377214826aee1fcb682c0b5d35dbd4c671cf6035b8fa81a944dd7697f404f78ba2ef740b4567859c5b651cb2a5dfa6ee83433bf0ed08dc03bf3429e37ae0acbf63effeab4e67428cdbaa01ea65c550", 0x3fffc0000000000, 0x80000001, 0x80000001, 0x20, 0x173f, 0x3, 0x800, 'syz1\x00'}) r2 = socket(0x8, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket(0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000280)=0xfffffffffffffffb, 0x9) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x800448d3, &(0x7f0000000040)={'team_slave_1\x00'}) 17:19:37 executing program 1 (fault-call:9 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:37 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:37 executing program 5: r0 = socket$inet6(0xa, 0x200000006, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$inet(r1, &(0x7f0000000380)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = accept(r0, 0x0, &(0x7f00000003c0)) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000200)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr, 0x200}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x44, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0xfffffffffffffe2f) socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000280)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000400)="7c9c9377484fbba5e9b542b97578bcc31dee8a7f98d6646dd86a7190a1b959", 0x1f) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="baa21c59c4d352ad56a85b4048b0d1605e2008c21950ab229af4e18ee08de6d17348b46d1de5497bfd0ef4e88a20647962a69336b46be7e40dbba1a0899cb5083c94e024f42edb0a50a3359ad1d30e04f41669d91445b4bed397340e9ad966a46a9203cfab8bb8ac3572daafe04569b4b813e87856d192fac18ac79a6103e993"], 0x80) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfffffcbe) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="323900009ea59d5140a72927811157fc745dc13f07f636e4006f90832624fd691f"], 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r4, r1, 0xf, 0x2}, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000240)=0x14, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) recvmmsg(r5, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 17:19:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x80b, 0xffffffffffffffff) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="240000005e0007031dfffd946f610500070000001d0000007a000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 2150.201937][T26916] FAULT_INJECTION: forcing a failure. [ 2150.201937][T26916] name failslab, interval 1, probability 0, space 0, times 0 [ 2150.222589][T26916] CPU: 0 PID: 26916 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2150.230209][T26916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2150.240284][T26916] Call Trace: [ 2150.243662][T26916] dump_stack+0x172/0x1f0 [ 2150.248043][T26916] should_fail.cold+0xa/0x15 [ 2150.252675][T26916] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2150.258514][T26916] ? ___might_sleep+0x163/0x280 [ 2150.263399][T26916] __should_failslab+0x121/0x190 [ 2150.268354][T26916] should_failslab+0x9/0x14 [ 2150.272875][T26916] __kmalloc+0x2dc/0x740 [ 2150.277133][T26916] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2150.283400][T26916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2150.289663][T26916] ? tls_get_rec+0x104/0x590 [ 2150.294281][T26916] tls_get_rec+0x104/0x590 [ 2150.298734][T26916] tls_sw_sendmsg+0xda5/0x17b0 [ 2150.303546][T26916] ? tx_work_handler+0xf0/0xf0 [ 2150.308719][T26916] ? aa_sk_perm+0x288/0x880 [ 2150.313345][T26916] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2150.319116][T26916] inet_sendmsg+0x147/0x5e0 [ 2150.323655][T26916] ? ipip_gro_receive+0x100/0x100 [ 2150.328736][T26916] sock_sendmsg+0xf2/0x170 [ 2150.333286][T26916] __sys_sendto+0x262/0x380 [ 2150.337827][T26916] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2150.343404][T26916] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2150.348987][T26916] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2150.355269][T26916] ? fput_many+0x12c/0x1a0 [ 2150.359706][T26916] ? fput+0x1b/0x20 [ 2150.363538][T26916] ? ksys_write+0x1cf/0x290 [ 2150.368082][T26916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2150.373566][T26916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2150.379051][T26916] ? do_syscall_64+0x26/0x680 [ 2150.384004][T26916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2150.390093][T26916] __x64_sys_sendto+0xe1/0x1a0 [ 2150.394882][T26916] do_syscall_64+0x103/0x680 [ 2150.399583][T26916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2150.405528][T26916] RIP: 0033:0x458da9 [ 2150.409460][T26916] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2150.430572][T26916] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2150.439013][T26916] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 17:19:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x275, &(0x7f0000000140)={@local, @empty=[0xffffffff00000006, 0xf000, 0xd, 0x500, 0xe803, 0xe0], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x6702, 0x0, 0x6, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864, 0x11, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xac1414aa}, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2f, 0x6c}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000040)={{0x3, @netrom}, [@null, @rose, @null, @rose, @remote, @default, @bcast]}, &(0x7f00000000c0)=0x48, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000001c0)=0x7, 0x4) r2 = accept(r1, &(0x7f0000003600)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000003680)=0x80) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000036c0)=0xfc6, 0x4) 17:19:37 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2150.446999][T26916] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2150.454986][T26916] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2150.462968][T26916] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2150.470958][T26916] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:37 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:37 executing program 4: ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000001c0), 0x12) readv(r1, &(0x7f00000002c0), 0x1a5) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) close(r2) 17:19:38 executing program 1 (fault-call:9 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2150.736404][ T27] audit: type=1804 audit(1558113577.989:373): pid=26921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir676603611/syzkaller.gUUSUU/4105/memory.events" dev="sda1" ino=17195 res=1 17:19:38 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2150.888122][ C0] net_ratelimit: 6 callbacks suppressed [ 2150.888133][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2150.926404][T26942] FAULT_INJECTION: forcing a failure. [ 2150.926404][T26942] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2150.983491][T26942] CPU: 0 PID: 26942 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2150.991092][T26942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2151.001434][T26942] Call Trace: [ 2151.004750][T26942] dump_stack+0x172/0x1f0 [ 2151.009288][T26942] should_fail.cold+0xa/0x15 [ 2151.013909][T26942] ? __sys_sendto+0x262/0x380 [ 2151.018634][T26942] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2151.024482][T26942] should_fail_alloc_page+0x50/0x60 [ 2151.029715][T26942] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2151.035122][T26942] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2151.040794][T26942] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2151.046550][T26942] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2151.052243][T26942] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2151.058526][T26942] alloc_pages_current+0x107/0x210 [ 2151.063678][T26942] skb_page_frag_refill+0x277/0x460 [ 2151.068913][T26942] sk_page_frag_refill+0x55/0x1f0 [ 2151.073970][T26942] sk_msg_alloc+0x10e/0x8d0 [ 2151.078516][T26942] tls_sw_sendmsg+0x63c/0x17b0 [ 2151.083328][T26942] ? tx_work_handler+0xf0/0xf0 [ 2151.088217][T26942] ? aa_sk_perm+0x288/0x880 [ 2151.092758][T26942] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2151.098431][T26942] inet_sendmsg+0x147/0x5e0 [ 2151.102964][T26942] ? ipip_gro_receive+0x100/0x100 [ 2151.108015][T26942] sock_sendmsg+0xf2/0x170 [ 2151.112466][T26942] __sys_sendto+0x262/0x380 [ 2151.117098][T26942] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2151.122494][T26942] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2151.128073][T26942] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2151.134328][T26942] ? fput_many+0x12c/0x1a0 [ 2151.138759][T26942] ? fput+0x1b/0x20 [ 2151.142581][T26942] ? ksys_write+0x1cf/0x290 [ 2151.147125][T26942] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2151.152693][T26942] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2151.158164][T26942] ? do_syscall_64+0x26/0x680 [ 2151.162862][T26942] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2151.168957][T26942] __x64_sys_sendto+0xe1/0x1a0 [ 2151.173742][T26942] do_syscall_64+0x103/0x680 [ 2151.178375][T26942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2151.184715][T26942] RIP: 0033:0x458da9 [ 2151.188685][T26942] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2151.208311][T26942] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2151.216755][T26942] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2151.224746][T26942] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2151.232730][T26942] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2151.240820][T26942] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2151.248809][T26942] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="810200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:39 executing program 4: r0 = socket$inet6(0xa, 0x40004, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x7fffffff, 0x8, 0x8, 0x81}, {0x6, 0x57dd2f3d, 0x5}, {0x9, 0x3, 0x1, 0x4}, {0x1, 0x81, 0x3f, 0x5}, {0x5, 0x10001, 0x401, 0x7}, {0x100000000, 0xf898, 0x100000001, 0xe00000000}]}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000340)=0xa8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x86, "8a290a76ea972e5573271353d6a634a10a01c670c7bbc963be361ebb3f36c799e056df458520185865f7c20d9b8567b39d3e41731fba18f0859130cc47c71e53fd8224e5741ffed148512fe12ea18600fde8132c2b55e1cfcb82bd12d2fcc4d68d2562e2752dbae662488a90ff125e6036ef761e989605b369ff493ba37f81e4cf74f5ff2fd4"}, &(0x7f00000002c0)=0x8e) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e20, 0x9, @local, 0x7}}, [0x3, 0xffffffffffffff80, 0x3, 0x0, 0xfffffffffffffff7, 0x20000000000000, 0x1, 0x2, 0xd41, 0x53f3a2fc, 0x2000000004, 0x100000001, 0x1, 0x7230, 0x7ff]}, &(0x7f0000000480)=0xffffffffffffff8a) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280)=0x4, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:19:39 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000240)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000e80)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f0000000780)=@hopopts={0x89, 0x7, [], [@hao={0xc9, 0x10, @ipv4={[], [], @broadcast}}, @pad1, @jumbo={0xc2, 0x4, 0x800}, @jumbo={0xc2, 0x4, 0x1}, @ra={0x5, 0x2, 0x8}, @hao={0xc9, 0x10, @local}, @pad1]}, 0x48) 17:19:39 executing program 1 (fault-call:9 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:39 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001940)={r0}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000001980)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, [0x5, 0x9, 0x0, 0x80000000, 0x3, 0x0, 0xb29c, 0x10001, 0xe6, 0x7fff, 0xff, 0x0, 0x2, 0x9, 0x5]}, &(0x7f0000001a80)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001ac0)={r2, 0x3}, 0x8) socketpair(0x8000000000001b, 0x80b, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$llc(r3, &(0x7f0000000040)=""/179, 0xb3, 0x40000001, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140)={0xfd5d}, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='rose0\x00', 0x10) ioctl$sock_bt_hci(r4, 0x800448d3, &(0x7f0000000180)="00008f51b9fb68f887f4c347c63e27b762f23e392875fa9bbf89eba36f7780465a1470b9ee3908d2e622b5ea38abc449f89bb5719035468cc0ff6dac20b7f87421c41e66280798d11bc07563543ccdbaadedad0689089c07e6e34b26225d32ce8294b3") setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000200), 0x4) 17:19:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="04006d3f9ea3ad102a110000000600000000000000000000a9a0e1bc5d488ef527d31c1f9a1225913721eaf06cb87faff775d48da8442450d9eeda39b200225ba95ddf0deffeaafa46aa83002df223546ef8b42cbdb72e614ab5f1f169113f642243e0327c28506db0c4db0ceffaaee474f7b64f8d48e8e2c6cc3087a53708e98eaaec561fd97cc63a577a8e6932f7bcfcfd16d4c23301c00c5d64136acf5cecccfb415e15c40dce2b8e69ea9b79643d59ec988bccc594242c2b9966a19cdbd5c632d71bc80c0c3db4554803af415b1440354a4106f1a51add91d17834bd2d84dd5ba45e5d8ec70128087fdbd35d3bb7ec339cbbe643c73c263134d6dfe6b01728"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x3f00, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2401000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x716, 0x70bd2a, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40045}, 0x4) accept$alg(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000804}, 0x44) 17:19:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(camellia-asm)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$inet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000180)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000040)="30cd98e7998eeeb3fc2eff46a5dbfb044e29", 0x12}], 0x1, 0x0, 0x0, 0x20000000}, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000240)={0xf886, 0x63, 0x1, 0x0, 0x0, [{r1, 0x0, 0x7}]}) 17:19:39 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2151.878842][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2151.905382][T26961] FAULT_INJECTION: forcing a failure. [ 2151.905382][T26961] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.962468][T26961] CPU: 0 PID: 26961 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2151.970065][T26961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2151.980144][T26961] Call Trace: [ 2151.983458][T26961] dump_stack+0x172/0x1f0 [ 2151.987809][T26961] should_fail.cold+0xa/0x15 [ 2151.992423][T26961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2151.998259][T26961] ? ___might_sleep+0x163/0x280 [ 2152.003219][T26961] __should_failslab+0x121/0x190 [ 2152.008164][T26961] should_failslab+0x9/0x14 [ 2152.012685][T26961] __kmalloc+0x2dc/0x740 [ 2152.016937][T26961] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2152.023185][T26961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.029645][T26961] ? tls_get_rec+0x104/0x590 [ 2152.034247][T26961] tls_get_rec+0x104/0x590 [ 2152.038678][T26961] tls_sw_sendmsg+0xda5/0x17b0 [ 2152.043469][T26961] ? tx_work_handler+0xf0/0xf0 [ 2152.048245][T26961] ? aa_sk_perm+0x288/0x880 [ 2152.052767][T26961] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2152.058337][T26961] inet_sendmsg+0x147/0x5e0 [ 2152.062849][T26961] ? ipip_gro_receive+0x100/0x100 [ 2152.067887][T26961] sock_sendmsg+0xf2/0x170 [ 2152.072318][T26961] __sys_sendto+0x262/0x380 [ 2152.076834][T26961] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2152.082216][T26961] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2152.087789][T26961] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2152.094038][T26961] ? fput_many+0x12c/0x1a0 [ 2152.098460][T26961] ? fput+0x1b/0x20 [ 2152.102270][T26961] ? ksys_write+0x1cf/0x290 [ 2152.106788][T26961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2152.112258][T26961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2152.117723][T26961] ? do_syscall_64+0x26/0x680 [ 2152.122760][T26961] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.128843][T26961] __x64_sys_sendto+0xe1/0x1a0 [ 2152.133630][T26961] do_syscall_64+0x103/0x680 [ 2152.138236][T26961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.144154][T26961] RIP: 0033:0x458da9 [ 2152.148053][T26961] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2152.167660][T26961] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2152.176092][T26961] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2152.184525][T26961] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2152.192505][T26961] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2152.200587][T26961] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2152.208584][T26961] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:39 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0xcb, 0x4) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 17:19:39 executing program 1 (fault-call:9 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2152.529172][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2152.557926][T26990] FAULT_INJECTION: forcing a failure. [ 2152.557926][T26990] name failslab, interval 1, probability 0, space 0, times 0 [ 2152.572048][T26990] CPU: 1 PID: 26990 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2152.579663][T26990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2152.589824][T26990] Call Trace: [ 2152.593147][T26990] dump_stack+0x172/0x1f0 [ 2152.597521][T26990] should_fail.cold+0xa/0x15 [ 2152.602140][T26990] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2152.608066][T26990] ? ___might_sleep+0x163/0x280 [ 2152.612939][T26990] __should_failslab+0x121/0x190 [ 2152.617895][T26990] should_failslab+0x9/0x14 [ 2152.622425][T26990] kmem_cache_alloc_node+0x264/0x710 [ 2152.627748][T26990] __alloc_skb+0xd5/0x5e0 [ 2152.632091][T26990] ? skb_trim+0x190/0x190 [ 2152.636442][T26990] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2152.642171][T26990] ? tcp_enter_memory_pressure+0x130/0x130 [ 2152.648002][T26990] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2152.653836][T26990] sk_stream_alloc_skb+0x326/0xd80 [ 2152.658975][T26990] do_tcp_sendpages+0xafa/0x1b70 [ 2152.663942][T26990] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2152.669251][T26990] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2152.675037][T26990] tls_push_sg+0x1de/0x680 [ 2152.679479][T26990] tls_tx_records+0x3c8/0x760 [ 2152.684174][T26990] tls_push_record+0x1f67/0x3580 [ 2152.689230][T26990] ? tls_tx_records+0x760/0x760 [ 2152.694098][T26990] ? lock_downgrade+0x880/0x880 [ 2152.699235][T26990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.705492][T26990] ? kasan_check_read+0x11/0x20 [ 2152.710361][T26990] bpf_exec_tx_verdict+0xe30/0x1280 [ 2152.715585][T26990] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2152.721333][T26990] ? tls_push_record+0x3580/0x3580 [ 2152.726533][T26990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2152.732824][T26990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.739078][T26990] ? sk_msg_alloc+0x62d/0x8d0 [ 2152.743782][T26990] tls_sw_sendmsg+0x107c/0x17b0 [ 2152.748663][T26990] ? tx_work_handler+0xf0/0xf0 [ 2152.753443][T26990] ? aa_sk_perm+0x288/0x880 [ 2152.757963][T26990] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2152.763526][T26990] inet_sendmsg+0x147/0x5e0 [ 2152.768045][T26990] ? ipip_gro_receive+0x100/0x100 [ 2152.773086][T26990] sock_sendmsg+0xf2/0x170 [ 2152.777523][T26990] __sys_sendto+0x262/0x380 [ 2152.782040][T26990] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2152.787430][T26990] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2152.793004][T26990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2152.799289][T26990] ? fput_many+0x12c/0x1a0 [ 2152.803721][T26990] ? fput+0x1b/0x20 [ 2152.807536][T26990] ? ksys_write+0x1cf/0x290 [ 2152.812051][T26990] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2152.817556][T26990] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2152.823041][T26990] ? do_syscall_64+0x26/0x680 [ 2152.827750][T26990] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.833837][T26990] __x64_sys_sendto+0xe1/0x1a0 [ 2152.838627][T26990] do_syscall_64+0x103/0x680 [ 2152.843243][T26990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.849148][T26990] RIP: 0033:0x458da9 [ 2152.853060][T26990] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2152.872703][T26990] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2152.881137][T26990] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2152.889127][T26990] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2152.897127][T26990] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2152.905148][T26990] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2152.913141][T26990] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="820200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:40 executing program 5: socketpair(0x5, 0x80000, 0x2, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSACCEPT(r1, 0x89e3) r2 = socket$netlink(0x10, 0x3, 0xe) getpeername$netrom(r0, &(0x7f0000001780)={{0x3, @null}, [@netrom, @remote, @remote, @default, @remote, @rose, @rose, @bcast]}, &(0x7f0000001800)=0x48) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000000)={0x0, 0xffffffffffffffc4, &(0x7f0000000080)={&(0x7f0000001840)=ANY=[@ANYBLOB="0322245b719793aa093b2b3989bf400c0bb7444478df94f4cbe80f73d8c7745bf559832fd6e2d043e722e110e5c8386d9c0b6f58e25ffc415c6f2e12437fcef41f081470096e54b0bbab3e6b373c7c16f83d0a67888bf195660efbdada090892aced7cf02719f7a8320b3c95a78df3bb8ea1261812314c1eb0c9c282e1c090aa92079937ae99b6f7128c92aa60fa6fb15f0111310f73", @ANYRESHEX=r1, @ANYBLOB="010000000000000000000300000058000100100001007564703a73797a3000000000440004000a0001000200000000000000ff01000000000000000000000000000100000500200002000300000000000000ff01000000000000000000000000000100000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) writev(r1, &(0x7f00000016c0)=[{&(0x7f00000000c0)="6293726ed10c2bf195d4fe8d621618a60de90546aa14a48e085fc22e19544354cdd9bc58352089b289eec1a977dfbc95b925184fe2e74038be175d281a522fbdb4dfb68754b737e6", 0x48}, {&(0x7f0000000140)="cac2713e4ae247ae435f0156b4934f38597ffc7e302a467466745f9f1c6200e03959b846198d2b8a218d61b5e0e609afaa066df413c2beefbbc2d36622b2868cbcf22963011b4e7202a1d96094b24ab8f0279f2d01856b3607bf59bacc748a7f541f0f6b7a88d883ea44240d105c98b8230786cfc0f8fd706c200067aa76ec82267046f0", 0x84}, {&(0x7f0000000200)="a1ad3431e9b4060e0008540b8c8a0ebbc506c150b0892201d603f4", 0x1b}, {&(0x7f0000000240)="37396661b364b1bee1e57a03a080aa0b8f13fff78bd0cca511633be600615fb73c819b87deda7b80a151803df856c5867a052710ae329f46c143afbe09f35e4ce67ac639495d3a815bbcf9fd3e1f6cb05047c63e67f4198d566fe020", 0x5c}, {&(0x7f00000002c0)="c06746e750bf0350eede8c011775226badfc42", 0x13}, {&(0x7f0000000400)="1ee430d961fc68944b87c6a784a05b6daf6e0a100521ebfd9bdb520088430754cf28666ecc7b69bf142a8bbafd077cb43181a92943a1f1c4947e8fc0e2d9c92af4e8fb38866fba5c27fcdb8e5351a7f2df8dbb6508083b96eb739a48ec87732d65e053f2a098f18910142a060676b8ec6ef05566", 0x74}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="f5c1150d11ae8ba4c9b86deefaea475eaa30ea9a14c674df34bb7eb5d2ca281759b98fcfa60976d0c7d5e7c6aad33adeb3d6c154f1963f79d5e4a725032304d21b1a9573113329f4a2e3b0b9288afa19655f0634ef9a6fc9c59172a8065a00c75c48c230c96e2c9728a7a11d3b86d4415ebd", 0x72}, {&(0x7f0000001500)="d80ffb06cc1f96094fae334ab5d0305a2f0daae412ed2ef1f4166b3b0f9d79bc0056fac97c7ee8253baf96df94ea787441b493f7067f1865d3a91e08033660b2e8fabf2e8071e9d824ac9b2c0607a9fff3050631bb64096f2d36c50c5b36e857116eb58fcd1e430b2b6586469d15a5d8454e549f73c5b31a1dcaa61be0f80791cfc9826a399a531c8d0b45e26e0ffe41535f9f8eced61c85d30c5f5b15a68fc792e6c4e17c4313f65ea2b4e65bb50bcd45bff978fe2d864a480e5a4cfc4084e75d5e455d152af139c45b497ed289f785085f039e90c47161", 0xd8}, {&(0x7f0000001600)="58a9a34cf084ab4c3708b015649317c83bd850ee1fea247204df4a4515f928c1b0009c0cc97db02a89e255c20f0003225ba5fa89eb6f873ed3f7e1c4bda1c10e5165ae1c6e02ac423508defc96b5d615e9c074586094bfe4033cd0416696a5d3226f27fb38969c0a3eec5b46c44fa033db0ace122d657e4fcc23bc81af59d5b1447d35dc92c11b9d", 0x88}], 0xa) 17:19:40 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80404}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xb8, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf93}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffaadc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="300000000000000084000000010000000000000000023400000041b9c291d606000000000000000000000000002d2991634fa9ef70cfd67023ecffc454b65eae56c26823ba652e18f317f6e3eb46ed37800761eb574a532622fae7ae663b6056aafccff4d34ebc68271b12c8a980d3e59790aff7ade634b9e09ef8d1d40eb7de502023dc194ac2291c4cef6f9f37f2086e0a27d6eba69fcfc9da0a7c09e4d4a600ba27f84225da00a88da1453458b2f0a9bfd6943f4427e5af6ff78a00bd969bd8e275b7244d3f679128713cc36b3d516199bdc3256399c88f3a8f552f1671a0c8d380424db8ab6750", @ANYRES32=0x0], 0xed}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x20}], 0x4924924924924d0, 0xff03) 17:19:40 executing program 1 (fault-call:9 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:40 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:40 executing program 4: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x2, 0x0, @initdev}, &(0x7f0000000280)=0x10, 0x80800) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000002c0)=0x3, 0x4) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = accept$netrom(0xffffffffffffff9c, &(0x7f00000000c0)={{0x3, @default}, [@netrom, @default, @remote, @rose, @remote, @remote, @remote, @null]}, &(0x7f0000000000)=0x48) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}}) r2 = socket(0x5, 0x1, 0x5) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000200), 0x1) ioctl(r2, 0x6, &(0x7f0000000180)="7d7986a0fcf6e3dd9f8f3ea0684fe78921150a2d229eccbc2f51b8eba1") setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000001c0)={0x400, 0xcde5, 0x100000000, 0x6, 0x1, 0x7, 0x3, 0x6, 0x0, 0x100000001, 0x7f}, 0xb) getsockopt(r2, 0x10f, 0x0, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 17:19:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x6, 0x100000001, 0x8000000001}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x2, 0x5]}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7fffffff, 0x56, "8c46f510d0bc67d6e3333bfaae58ca329012a2505c8442488e98571dafa52c73a1c46963c4a234e29bd935985db4806d3560eff945baef834566acaa5e154db9c37e8519fa3cf108c998a4ed9d1174cbd7136445d654"}, 0x5e) 17:19:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x18) r2 = socket$inet6(0xa, 0x4, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x4e23, @local}], 0x2c) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2153.291755][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2153.319553][T27017] FAULT_INJECTION: forcing a failure. [ 2153.319553][T27017] name failslab, interval 1, probability 0, space 0, times 0 17:19:40 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2153.373866][T27017] CPU: 0 PID: 27017 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2153.381498][T27017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2153.391588][T27017] Call Trace: [ 2153.395024][T27017] dump_stack+0x172/0x1f0 [ 2153.399399][T27017] should_fail.cold+0xa/0x15 [ 2153.404016][T27017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2153.410029][T27017] ? ___might_sleep+0x163/0x280 [ 2153.414904][T27017] __should_failslab+0x121/0x190 [ 2153.419854][T27017] should_failslab+0x9/0x14 [ 2153.424380][T27017] kmem_cache_alloc_node_trace+0x270/0x720 [ 2153.430235][T27017] __kmalloc_node_track_caller+0x3d/0x70 [ 2153.435893][T27017] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2153.441474][T27017] __alloc_skb+0x10b/0x5e0 [ 2153.445916][T27017] ? skb_trim+0x190/0x190 [ 2153.450269][T27017] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2153.456005][T27017] ? tcp_enter_memory_pressure+0x130/0x130 [ 2153.461914][T27017] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2153.467749][T27017] sk_stream_alloc_skb+0x326/0xd80 17:19:40 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeaffffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2153.472971][T27017] do_tcp_sendpages+0xafa/0x1b70 [ 2153.477943][T27017] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2153.484236][T27017] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2153.490656][T27017] tls_push_sg+0x1de/0x680 [ 2153.495108][T27017] tls_tx_records+0x3c8/0x760 [ 2153.499810][T27017] tls_push_record+0x1f67/0x3580 [ 2153.504874][T27017] ? tls_tx_records+0x760/0x760 [ 2153.509745][T27017] ? lock_downgrade+0x880/0x880 [ 2153.514632][T27017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2153.521068][T27017] ? kasan_check_read+0x11/0x20 [ 2153.525939][T27017] bpf_exec_tx_verdict+0xe30/0x1280 [ 2153.531162][T27017] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2153.536898][T27017] ? tls_push_record+0x3580/0x3580 [ 2153.542557][T27017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2153.555636][T27017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2153.562122][T27017] ? sk_msg_alloc+0x62d/0x8d0 [ 2153.566827][T27017] tls_sw_sendmsg+0x107c/0x17b0 [ 2153.571795][T27017] ? tx_work_handler+0xf0/0xf0 [ 2153.576571][T27017] ? aa_sk_perm+0x288/0x880 [ 2153.581111][T27017] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2153.586682][T27017] inet_sendmsg+0x147/0x5e0 [ 2153.591219][T27017] ? ipip_gro_receive+0x100/0x100 [ 2153.596276][T27017] sock_sendmsg+0xf2/0x170 [ 2153.600718][T27017] __sys_sendto+0x262/0x380 [ 2153.605252][T27017] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2153.607680][T27034] sctp: [Deprecated]: syz-executor.5 (pid 27034) Use of int in maxseg socket option. 17:19:40 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2153.607680][T27034] Use struct sctp_assoc_value instead [ 2153.610647][T27017] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2153.610681][T27017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2153.637855][T27017] ? fput_many+0x12c/0x1a0 [ 2153.642482][T27017] ? fput+0x1b/0x20 [ 2153.646328][T27017] ? ksys_write+0x1cf/0x290 [ 2153.651029][T27017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2153.656506][T27017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2153.661971][T27017] ? do_syscall_64+0x26/0x680 [ 2153.666662][T27017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2153.672750][T27017] __x64_sys_sendto+0xe1/0x1a0 [ 2153.677533][T27017] do_syscall_64+0x103/0x680 [ 2153.682232][T27017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2153.688138][T27017] RIP: 0033:0x458da9 [ 2153.692051][T27017] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2153.711763][T27017] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2153.720295][T27017] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2153.728286][T27017] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2153.736375][T27017] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2153.744582][T27017] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2153.752680][T27017] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2153.761067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2153.766917][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="830200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:41 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000007000)=ANY=[@ANYBLOB="aaaa0000280000000000069078ac14ffaae000000400004e2000"/38, @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5010000090780000"], 0x0) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000005240), &(0x7f0000005280)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000052c0), 0x4) 17:19:41 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x5, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}}, 0x88) socket$inet(0x2, 0x3, 0x3) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0xffffff7f, @fd}]}]}, 0x24c}}, 0x0) 17:19:41 executing program 1 (fault-call:9 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:41 executing program 2: r0 = socket$inet6(0x10, 0x800400000002, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="5500000019007f53000000b2a0a280930a6000f7fea8433591000000390009003500d8060000000019000500fe690000000000dc1338d54400136ef75afbf0555ddfe4ea73224a070a2783de448daa7227c43ab822", 0xfffffffffffffe1b}], 0x1000000000000330}, 0x0) 17:19:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="1f0000000a0a193b02000700000006816ac7bab6f48af0c637fbdc83ee0002", 0x1f}], 0x1) [ 2154.351918][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2154.375996][T27057] FAULT_INJECTION: forcing a failure. [ 2154.375996][T27057] name failslab, interval 1, probability 0, space 0, times 0 [ 2154.399273][T27057] CPU: 1 PID: 27057 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2154.406902][T27057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2154.416969][T27057] Call Trace: [ 2154.417001][T27057] dump_stack+0x172/0x1f0 [ 2154.424619][T27057] should_fail.cold+0xa/0x15 [ 2154.424637][T27057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2154.424655][T27057] ? ___might_sleep+0x163/0x280 [ 2154.424674][T27057] __should_failslab+0x121/0x190 [ 2154.424689][T27057] should_failslab+0x9/0x14 [ 2154.424712][T27057] __kmalloc+0x2dc/0x740 [ 2154.453655][T27057] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2154.460263][T27057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.466514][T27057] ? tls_get_rec+0x104/0x590 [ 2154.466532][T27057] tls_get_rec+0x104/0x590 [ 2154.466550][T27057] tls_sw_sendmsg+0xda5/0x17b0 [ 2154.466580][T27057] ? tx_work_handler+0xf0/0xf0 [ 2154.485681][T27057] ? aa_sk_perm+0x288/0x880 [ 2154.490220][T27057] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2154.490244][T27057] inet_sendmsg+0x147/0x5e0 [ 2154.490264][T27057] ? ipip_gro_receive+0x100/0x100 [ 2154.505348][T27057] sock_sendmsg+0xf2/0x170 [ 2154.509799][T27057] __sys_sendto+0x262/0x380 [ 2154.514327][T27057] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2154.519720][T27057] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2154.525308][T27057] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2154.531567][T27057] ? fput_many+0x12c/0x1a0 [ 2154.536159][T27057] ? fput+0x1b/0x20 [ 2154.539985][T27057] ? ksys_write+0x1cf/0x290 [ 2154.544512][T27057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2154.549984][T27057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2154.555544][T27057] ? do_syscall_64+0x26/0x680 [ 2154.560324][T27057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2154.566412][T27057] __x64_sys_sendto+0xe1/0x1a0 [ 2154.571204][T27057] do_syscall_64+0x103/0x680 [ 2154.575817][T27057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2154.581723][T27057] RIP: 0033:0x458da9 17:19:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000000)=0x2) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0xfff}) 17:19:41 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000002980)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f00000000c0)=""/12, 0xc}], 0x3, &(0x7f0000000300)=""/79, 0x4f}, 0x5}, {{&(0x7f0000000380)=@caif=@dgm, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)=""/55, 0x37}], 0x1, &(0x7f0000000540)=""/153, 0x99}, 0x1}, {{&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/251, 0xfb}, {&(0x7f0000000700)=""/146, 0x92}, {&(0x7f00000007c0)=""/172, 0xac}, {&(0x7f0000000880)=""/51, 0x33}, {&(0x7f00000008c0)=""/124, 0x7c}, {&(0x7f0000000980)=""/216, 0xd8}], 0x6}, 0x9c}, {{0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000b40)=""/65, 0x41}, 0x1ff}, {{&(0x7f0000000bc0)=@rc, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000c40)=""/205, 0xcd}, {&(0x7f0000000d40)=""/21, 0x15}, {&(0x7f0000000d80)=""/187, 0xbb}, {&(0x7f0000000e40)=""/253, 0xfd}], 0x4, &(0x7f0000000f80)=""/50, 0x32}, 0x9}, {{&(0x7f0000000fc0)=@un=@abs, 0x80, &(0x7f0000001400)=[{&(0x7f0000001040)=""/254, 0xfe}, {&(0x7f0000001140)=""/101, 0x65}, {&(0x7f00000011c0)=""/220, 0xdc}, {&(0x7f00000012c0)=""/28, 0x1c}, {&(0x7f0000001300)=""/43, 0x2b}, {&(0x7f0000001340)=""/157, 0x9d}], 0x6, &(0x7f0000001480)=""/176, 0xb0}, 0x1ff}, {{&(0x7f0000001540)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000015c0)=""/18, 0x12}, {&(0x7f0000001600)=""/10, 0xa}, {&(0x7f0000001640)=""/154, 0x9a}, {&(0x7f0000001700)=""/212, 0xd4}, {&(0x7f0000001800)=""/100, 0x64}, {&(0x7f0000001880)=""/33, 0x21}], 0x6, &(0x7f0000001940)=""/4096, 0x1000}, 0x8}, {{0x0, 0x0, &(0x7f0000002940)}, 0x4}], 0x8, 0x2, &(0x7f0000002b80)) getsockname$netrom(r0, &(0x7f0000002bc0)={{0x3, @default}, [@default, @rose, @default, @bcast, @null, @bcast, @null, @rose]}, &(0x7f0000002c40)=0x48) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000002c80)="292c0cf44455df47deb35f4e1bdac1fa3f2143b7fd37fb01c49cad2ed531bbef139e8be2b21fc8bbdd00f53bf2c3614356d7b88ff654580b16ac861b4abd6696f83e4fc4b6322cbbd18f79a4da63c3721f6516a6d241f9bc583137e8653efa93e83c1d0fd882414d91265896ab74dd17864a29ded3350e0cf756f74c658e6d78a8fe6d304baefe3d302aacf221bd0974e931e09342d94e1841b6adcfa4dc5adbeb922b68", 0xa4, 0x840, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="dabe3cf3f3cbd7d248dcd4146787839fb41188f9c1f4557719a40ef9ae11aacc", 0x20) sendmmsg(r2, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="4b09fa995f52a690dd41b51b1cb7ddbe9fd3973761e8f17ec33e0b38a54800be", 0x20}], 0x1}}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/130, 0x82}], 0x1, 0x0, 0xf00000000000000}}], 0x1, 0x0, 0x0) [ 2154.585638][T27057] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2154.605357][T27057] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2154.613816][T27057] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2154.621897][T27057] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2154.629971][T27057] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2154.637963][T27057] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:41 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2154.645940][T27057] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:42 executing program 5: r0 = accept4(0xffffffffffffff9c, &(0x7f0000003640)=@ipx, &(0x7f00000036c0)=0x80, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000003700)=0x1, 0x4) listen(r0, 0x7fff) listen(r0, 0x0) sendmsg$alg(r0, &(0x7f0000003b40)={0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003740)="c757400b84b096809475c8186f20ab0f5390684a4b1ea818a9aaa777343a02ec656047a25a08a4a9d3b415da11", 0x2d}, {&(0x7f0000003780)="dd69ccfa6a1267caef2bc00b07b3bab4440e2edc88981264c382e358d70b51409baa89916e9d9a17de6a5054106587bf05cfac464085c5335d8b645ac2f9d02650e53014dfa3592a593c7ccfa10d5684cd6bf46845d702c3f9c084683f4aaca595873b02d9da3a8e3b8a80b9e9aecf569981810c893b958739bbc711877960328d3e899e32647f0163c6d6053559c6cbeed745e7d13cc45f12899b7e306621b98b32cc2af8d110361c1ec9c4aa89bd849a17ce6384aaf560fa2a1a7a99b760de82f02f31ce285dd2cc340808610905987dbf5d1cc79bae9a79ed54bda9f6d39acfe0ee11c6715480a7e78c3b93a39ca8c0caf9fa", 0xf4}, {&(0x7f0000003880)="be49c63c5f59d64390f849ae543a5a34faa823fe323b5e216fb1169875c10df65d02a33d26ec55707a27b702e0826bc6e0429e907fe7faa51bd7876987d27299b4b4b6328ba7ed7c4ed02612490a4569c3ebbb54012b3c04a0ef57d0cfae6d160a218e335f2329a3c0a136eb6a7adfecdc89114019ab69a7f20696365cb630739ebed9e1ee20d9ff0695edc699cc6260a7292e01a083ac05455941e2bc4eedaa40733c8ce2", 0xa5}, {&(0x7f0000003940)="9a644116560703639a98c343db7278dd1d25b86daa09811df90ed283d484018c324f90eb35091ae633e02a7188e9848bb05f7ec2bb932059e3fd5edc2078d1eefd7747f73d616be9819582980f51391f24a2074463997a79f256ed658d0b3052358a5704d6694af00594c97bc567625d0d258bbecb9d464954b49943a6d41221e7fd0ab52521a3", 0x87}], 0x4, &(0x7f0000003a40)=[@op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xa0, 0x117, 0x2, 0x87, "9018ec5a560ab7ff9f920af8ac3fd2b4a67b8a425e5c2d66c6a9dae1af17c96c51afef3d7801966643e231e20abc523ae216380535e1993b12dddde8cfd01274038d44af5e6d6a1824fda9439c8f28a4fa504851080f2ef154a89904d64233061f9196be338e88c39a54d2552b8956c15fa818037cef0b2eef8660550558aa5b2d09c65d5a1d2b"}], 0xd0, 0x14}, 0x8000) recvfrom$rose(r0, &(0x7f0000003b80)=""/142, 0x8e, 0x2000, &(0x7f0000003c40)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x20010, r0, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000003c80)='caif0\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000003d00)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000003f80)={&(0x7f0000003cc0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000003f40)={&(0x7f0000003d40)={0x1f8, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x19}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x702dc242}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2762}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfa}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x63}]}, @TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4b03}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb6}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xbe0}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x4}, 0x20044001) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000004140)={&(0x7f0000003fc0)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000004100)={&(0x7f0000004000)={0xd4, r1, 0x318, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf869}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3f, @rand_addr="df86313047818afa6d907b5ad6b3e314", 0x3cc}}}}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x8080) getsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f0000004180)=""/79, &(0x7f0000004200)=0x4f) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000004240)={0x0, 0x3}, &(0x7f0000004280)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000042c0)={r2, 0x9}, &(0x7f0000004300)=0x8) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000004340), &(0x7f0000004380)=0x10) connect$l2tp(r0, &(0x7f00000043c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x1, 0x3, {0xa, 0x4e22, 0x100, @mcast2, 0x2}}}, 0x32) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000004400)=r2, 0x4) r4 = socket(0x0, 0x3, 0x1000) getsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000004440), &(0x7f0000004480)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000044c0)={r3, 0xd06}, 0x8) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000004600)={&(0x7f0000004500)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f00000045c0)={&(0x7f0000004540)={0x80, r1, 0x402, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xb5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x76f4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xbc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfd00000000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x411bf1fc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffff8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x80) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000004640)={r2, 0xcea1, 0xfffffffffffffffc, 0x5, 0x200, 0x9}, 0x14) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000004680), &(0x7f00000046c0)=0x8) ioctl$SIOCX25SSUBSCRIP(r4, 0x89e1, &(0x7f0000004700)={'veth0_to_bond\x00', 0x6, 0x1}) accept4$vsock_stream(r4, &(0x7f0000004800)={0x28, 0x0, 0x2711}, 0x10, 0x800) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000004840)={r2, @in6={{0xa, 0x4e21, 0x6, @loopback, 0x1f1d}}}, &(0x7f0000004900)=0x84) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000004940)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000004a40)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000004a80)={0x6f021ba134d2a7e7, 0x8001, 0x8c9b, 0x3cc4, 0x10, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffff9c, 0x2, 0x1}, 0x3c) sendto$inet6(r0, &(0x7f0000004ac0)="86eb08244685b7af146c61dd318bc4298898507b40976936ed25c070e448275787c2637c7cf432f5c60e7ba3ac093ceb173e25bbeb858208ca535488f2cdf473686372444e48d2e664907ef65448cbd9cfcb1083131f00346b084dcc69b7a6cae54614c79f42fc6bf803e99fe3a27725d8f9f5fd3c25d0f495cc073f49f9a553a10dd71530a4581b76e31357f025be462296c758aefed6f5747c8d6c94e926751a8b6f6cb5fd2fcd6d1dd49e088d50ae012a2c42a5456f7e32f5b8a08dfc07db00632cffa3f50a", 0xc7, 0x0, 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f0000004bc0)="9e49af3037846aea05002a2a3c1a003272f4751a3f4071313142a97ae0cee06b2a5735d8e230f0a677eae48dabc1c82807bf3de280e80991e589", 0x3a) 17:19:42 executing program 1 (fault-call:9 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2154.704519][T27070] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 4095 (only 16 groups) [ 2154.983747][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2155.000023][T27087] FAULT_INJECTION: forcing a failure. [ 2155.000023][T27087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2155.024446][T27087] CPU: 1 PID: 27087 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2155.032148][T27087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2155.042395][T27087] Call Trace: [ 2155.045722][T27087] dump_stack+0x172/0x1f0 [ 2155.050075][T27087] should_fail.cold+0xa/0x15 [ 2155.054723][T27087] ? __sys_sendto+0x262/0x380 [ 2155.059419][T27087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2155.065318][T27087] should_fail_alloc_page+0x50/0x60 [ 2155.070525][T27087] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2155.075899][T27087] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2155.075917][T27087] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2155.075930][T27087] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2155.075953][T27087] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2155.075973][T27087] alloc_pages_current+0x107/0x210 [ 2155.075995][T27087] skb_page_frag_refill+0x277/0x460 [ 2155.109756][T27087] sk_page_frag_refill+0x55/0x1f0 [ 2155.114792][T27087] sk_msg_alloc+0x10e/0x8d0 [ 2155.119318][T27087] tls_sw_sendmsg+0x63c/0x17b0 [ 2155.124107][T27087] ? tx_work_handler+0xf0/0xf0 [ 2155.128895][T27087] ? aa_sk_perm+0x288/0x880 [ 2155.133416][T27087] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2155.138985][T27087] inet_sendmsg+0x147/0x5e0 [ 2155.143498][T27087] ? ipip_gro_receive+0x100/0x100 [ 2155.148543][T27087] sock_sendmsg+0xf2/0x170 [ 2155.152987][T27087] __sys_sendto+0x262/0x380 [ 2155.157515][T27087] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2155.162918][T27087] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2155.168494][T27087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2155.174756][T27087] ? fput_many+0x12c/0x1a0 [ 2155.179208][T27087] ? fput+0x1b/0x20 [ 2155.183026][T27087] ? ksys_write+0x1cf/0x290 [ 2155.187557][T27087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2155.193046][T27087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2155.198525][T27087] ? do_syscall_64+0x26/0x680 [ 2155.203520][T27087] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2155.209637][T27087] __x64_sys_sendto+0xe1/0x1a0 [ 2155.214516][T27087] do_syscall_64+0x103/0x680 [ 2155.219138][T27087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2155.225045][T27087] RIP: 0033:0x458da9 [ 2155.228973][T27087] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2155.248606][T27087] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2155.257240][T27087] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2155.265235][T27087] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2155.273227][T27087] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2155.281218][T27087] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2155.289213][T27087] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:42 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x2}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) getsockname(r0, &(0x7f0000000700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000780)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000007c0)={@rand_addr, 0x0}, &(0x7f0000000800)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000009c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1108}, 0xc, &(0x7f0000000980)={&(0x7f0000000840)={0x120, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x7c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r4}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}]}}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x21810, r0, 0x0) 17:19:42 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="240000001a0001f00080000400ede80e0af6f92c7839010600f2ffcb0800190005d70000", 0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008914, &(0x7f0000000140)="0adc1f023c12") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl(0xffffffffffffffff, 0x7ffffe, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffaaaaaa0dba61cd9da8f2e412000000000001907800000000450000000000000000040000"], 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x4e20, 0x0, @local}, {0xa, 0x4e23, 0x7, @local}, 0x8, [0x4, 0xff, 0x5, 0x0, 0x3, 0x1000, 0x1, 0x4]}, 0x5c) unshare(0x40000000) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, &(0x7f0000000340)) r3 = socket$nl_generic(0xa, 0x5, 0x84) sendmsg$can_bcm(r2, &(0x7f0000000280)={&(0x7f0000000100), 0x10, &(0x7f0000000240)={&(0x7f0000000180)={0x5, 0x800, 0x0, {0x77359400}, {0x0, 0x2710}, {0x1, 0x6, 0x2, 0x8000}, 0x1, @canfd={{0x4, 0x9, 0x2, 0x518}, 0x2b, 0x1, 0x0, 0x0, "ee6c05c5d49b5d0a850626ae6e239886c4dc8cbfc5a4c8b2b6a68c875d58e75d5629a297373e3815d8bb04739771e5cdc2658965e81fc7876afa22afe3ba39fb"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000000)={'ip6grx0\x00\x00\x00\x00\x00\x00\x00\xeb\x00', &(0x7f0000000040)=@ethtool_test}) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000001c0)=ANY=[]) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 17:19:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="840200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:42 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23}, 0xfffffffffffffe9c) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000003c0)={'teql0\x00', {0x2, 0x0, @dev}}) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, &(0x7f00000002c0)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000300)={0x0, 0x9, "7374e694e2d77790da"}, &(0x7f0000000340)=0x11) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={r1, 0x4}, 0x8) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7, 0x6}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={r3, 0x5}, 0x8) 17:19:42 executing program 1 (fault-call:9 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:42 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x3}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2155.584087][T27102] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x2 [ 2155.609715][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, {}, 0xfffffffffffffffc}, 0xe) listen(r2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x4, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @loopback}}}, 0x108) [ 2155.678839][T27106] FAULT_INJECTION: forcing a failure. [ 2155.678839][T27106] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.724697][T27106] CPU: 1 PID: 27106 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2155.732300][T27106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2155.736175][T27100] IPVS: ftp: loaded support on port[0] = 21 [ 2155.742379][T27106] Call Trace: [ 2155.742409][T27106] dump_stack+0x172/0x1f0 [ 2155.742434][T27106] should_fail.cold+0xa/0x15 [ 2155.742457][T27106] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2155.766841][T27106] ? ___might_sleep+0x163/0x280 [ 2155.771713][T27106] __should_failslab+0x121/0x190 [ 2155.776670][T27106] should_failslab+0x9/0x14 [ 2155.781189][T27106] __kmalloc+0x2dc/0x740 [ 2155.785448][T27106] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2155.791702][T27106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2155.797952][T27106] ? tls_get_rec+0x104/0x590 [ 2155.802553][T27106] tls_get_rec+0x104/0x590 [ 2155.806988][T27106] tls_sw_sendmsg+0xda5/0x17b0 [ 2155.807022][T27106] ? tx_work_handler+0xf0/0xf0 [ 2155.807044][T27106] ? aa_sk_perm+0x288/0x880 [ 2155.821094][T27106] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2155.826663][T27106] inet_sendmsg+0x147/0x5e0 [ 2155.826679][T27106] ? ipip_gro_receive+0x100/0x100 [ 2155.826701][T27106] sock_sendmsg+0xf2/0x170 [ 2155.836221][T27106] __sys_sendto+0x262/0x380 [ 2155.836241][T27106] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2155.836261][T27106] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2155.836290][T27106] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2155.836310][T27106] ? fput_many+0x12c/0x1a0 [ 2155.856144][T27106] ? fput+0x1b/0x20 [ 2155.856167][T27106] ? ksys_write+0x1cf/0x290 [ 2155.875399][T27106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2155.880877][T27106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2155.886348][T27106] ? do_syscall_64+0x26/0x680 [ 2155.886366][T27106] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2155.886388][T27106] __x64_sys_sendto+0xe1/0x1a0 [ 2155.886408][T27106] do_syscall_64+0x103/0x680 [ 2155.886429][T27106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2155.893438][T27124] IPVS: ftp: loaded support on port[0] = 21 [ 2155.897159][T27106] RIP: 0033:0x458da9 17:19:43 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x4e25, @local}}) [ 2155.897176][T27106] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2155.897184][T27106] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2155.897198][T27106] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2155.897213][T27106] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2155.918340][T27106] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:19:43 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x4}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2155.941837][T27106] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2155.941847][T27106] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:43 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x6}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:43 executing program 1 (fault-call:9 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2156.209975][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2156.233952][T27138] FAULT_INJECTION: forcing a failure. [ 2156.233952][T27138] name failslab, interval 1, probability 0, space 0, times 0 [ 2156.256823][T27138] CPU: 1 PID: 27138 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2156.264423][T27138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2156.274494][T27138] Call Trace: [ 2156.274524][T27138] dump_stack+0x172/0x1f0 [ 2156.274556][T27138] should_fail.cold+0xa/0x15 [ 2156.286813][T27138] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2156.286835][T27138] ? ___might_sleep+0x163/0x280 [ 2156.286857][T27138] __should_failslab+0x121/0x190 [ 2156.306318][T27138] should_failslab+0x9/0x14 [ 2156.306338][T27138] kmem_cache_alloc_node+0x264/0x710 [ 2156.306366][T27138] __alloc_skb+0xd5/0x5e0 [ 2156.316163][T27138] ? skb_trim+0x190/0x190 [ 2156.316180][T27138] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2156.316199][T27138] ? tcp_enter_memory_pressure+0x130/0x130 [ 2156.336513][T27138] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2156.336535][T27138] sk_stream_alloc_skb+0x326/0xd80 [ 2156.336555][T27138] do_tcp_sendpages+0xafa/0x1b70 [ 2156.336582][T27138] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2156.352460][T27138] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2156.352480][T27138] tls_push_sg+0x1de/0x680 [ 2156.352504][T27138] tls_tx_records+0x3c8/0x760 [ 2156.352524][T27138] tls_push_record+0x1f67/0x3580 [ 2156.352552][T27138] ? tls_tx_records+0x760/0x760 [ 2156.372643][T27138] ? lock_downgrade+0x880/0x880 [ 2156.382430][T27138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.382449][T27138] ? kasan_check_read+0x11/0x20 [ 2156.382469][T27138] bpf_exec_tx_verdict+0xe30/0x1280 [ 2156.382490][T27138] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2156.382508][T27138] ? tls_push_record+0x3580/0x3580 [ 2156.393670][T27138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2156.393688][T27138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.393712][T27138] ? sk_msg_alloc+0x62d/0x8d0 [ 2156.414864][T27138] tls_sw_sendmsg+0x107c/0x17b0 [ 2156.414897][T27138] ? tx_work_handler+0xf0/0xf0 [ 2156.427514][T27138] ? aa_sk_perm+0x288/0x880 [ 2156.427541][T27138] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2156.427565][T27138] inet_sendmsg+0x147/0x5e0 [ 2156.441909][T27138] ? ipip_gro_receive+0x100/0x100 [ 2156.441930][T27138] sock_sendmsg+0xf2/0x170 [ 2156.441951][T27138] __sys_sendto+0x262/0x380 [ 2156.452085][T27138] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2156.452107][T27138] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2156.452141][T27138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2156.461663][T27138] ? fput_many+0x12c/0x1a0 [ 2156.461679][T27138] ? fput+0x1b/0x20 [ 2156.461693][T27138] ? ksys_write+0x1cf/0x290 [ 2156.461713][T27138] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2156.461733][T27138] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2156.470670][T27138] ? do_syscall_64+0x26/0x680 [ 2156.470690][T27138] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.470712][T27138] __x64_sys_sendto+0xe1/0x1a0 [ 2156.470733][T27138] do_syscall_64+0x103/0x680 [ 2156.481682][T27138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.481695][T27138] RIP: 0033:0x458da9 17:19:43 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x7}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2156.481711][T27138] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2156.481727][T27138] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2156.496209][T27138] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2156.496219][T27138] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2156.496227][T27138] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2156.496236][T27138] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2156.496244][T27138] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:43 executing program 1 (fault-call:9 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2156.642089][T27144] IPVS: ftp: loaded support on port[0] = 21 [ 2156.823873][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2156.841785][T27157] FAULT_INJECTION: forcing a failure. [ 2156.841785][T27157] name failslab, interval 1, probability 0, space 0, times 0 [ 2156.855841][T27157] CPU: 1 PID: 27157 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2156.863423][T27157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2156.873777][T27157] Call Trace: [ 2156.877082][T27157] dump_stack+0x172/0x1f0 [ 2156.881444][T27157] should_fail.cold+0xa/0x15 [ 2156.881469][T27157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2156.891870][T27157] ? ___might_sleep+0x163/0x280 [ 2156.891900][T27157] __should_failslab+0x121/0x190 [ 2156.901685][T27157] should_failslab+0x9/0x14 [ 2156.901705][T27157] kmem_cache_alloc_node_trace+0x270/0x720 [ 2156.901731][T27157] __kmalloc_node_track_caller+0x3d/0x70 [ 2156.912031][T27157] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2156.912052][T27157] __alloc_skb+0x10b/0x5e0 [ 2156.912071][T27157] ? skb_trim+0x190/0x190 [ 2156.923092][T27157] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2156.923105][T27157] ? tcp_enter_memory_pressure+0x130/0x130 [ 2156.923129][T27157] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2156.923148][T27157] sk_stream_alloc_skb+0x326/0xd80 [ 2156.923170][T27157] do_tcp_sendpages+0xafa/0x1b70 [ 2156.931936][T27157] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2156.931960][T27157] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2156.943558][T27157] tls_push_sg+0x1de/0x680 [ 2156.943582][T27157] tls_tx_records+0x3c8/0x760 [ 2156.943612][T27157] tls_push_record+0x1f67/0x3580 [ 2156.943647][T27157] ? tls_tx_records+0x760/0x760 [ 2156.954578][T27157] ? lock_downgrade+0x880/0x880 [ 2156.954604][T27157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.954620][T27157] ? kasan_check_read+0x11/0x20 [ 2156.954640][T27157] bpf_exec_tx_verdict+0xe30/0x1280 [ 2156.954660][T27157] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2156.954680][T27157] ? tls_push_record+0x3580/0x3580 [ 2156.964977][T27157] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2156.964998][T27157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.975172][T27157] ? sk_msg_alloc+0x62d/0x8d0 [ 2156.975198][T27157] tls_sw_sendmsg+0x107c/0x17b0 [ 2156.975231][T27157] ? tx_work_handler+0xf0/0xf0 [ 2156.975253][T27157] ? aa_sk_perm+0x288/0x880 [ 2156.985496][T27157] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2156.985518][T27157] inet_sendmsg+0x147/0x5e0 [ 2156.985532][T27157] ? ipip_gro_receive+0x100/0x100 [ 2156.985550][T27157] sock_sendmsg+0xf2/0x170 [ 2156.985571][T27157] __sys_sendto+0x262/0x380 [ 2156.995300][T27157] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2156.995320][T27157] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2156.995348][T27157] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2156.995362][T27157] ? fput_many+0x12c/0x1a0 [ 2156.995380][T27157] ? fput+0x1b/0x20 [ 2157.006645][T27157] ? ksys_write+0x1cf/0x290 [ 2157.006666][T27157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2157.006682][T27157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2157.006704][T27157] ? do_syscall_64+0x26/0x680 [ 2157.017707][T27157] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.017733][T27157] __x64_sys_sendto+0xe1/0x1a0 [ 2157.017757][T27157] do_syscall_64+0x103/0x680 [ 2157.029199][T27157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.029211][T27157] RIP: 0033:0x458da9 [ 2157.029228][T27157] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2157.029243][T27157] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2157.040161][T27157] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2157.040171][T27157] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2157.040180][T27157] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2157.040188][T27157] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2157.040197][T27157] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2157.376236][T27127] IPVS: ftp: loaded support on port[0] = 21 17:19:47 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000100a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 17:19:47 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x8}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:47 executing program 1 (fault-call:9 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:47 executing program 2: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xc5) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) poll(0x0, 0x0, 0x9) sendfile(r1, r1, &(0x7f0000000100), 0xe08c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000700)) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="999b1eb3b6d26d7d8b5460199181637053b25a8911c63cd55d0002692cfa40dec9437f913430588d4ed71a59e303457cedc809497300a9ff37aa5d2e50ce69e68ac6a81d05b8a7008cc12ebd50e9a780f8a84d8f74faf9a251de9dad1e9f2bec1491e5c3b0ea7d3dcd58768deeabc9c69027427e3e95b98b7919601adbd2ba66219f79226fb8977666627e0fb5e5bf2a45d7b41ad8c2d3192888d0992c757f463f8d02dd7f11185ef26637d3a46fc5f7a913443432638c06ed6c27200478b60f824f0ea43a783f02db11235949bb9f47", 0xd0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 17:19:47 executing program 4: clock_gettime(0x8, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) accept4$nfc_llcp(r0, &(0x7f0000000340), &(0x7f00000003c0)=0x60, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) 17:19:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="850200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:47 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x12}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2160.269520][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:19:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r2, &(0x7f0000000000)="1c0000001a009b8814e5f407000904000a00"/28, 0x1c) [ 2160.311904][T27176] FAULT_INJECTION: forcing a failure. [ 2160.311904][T27176] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.382889][T27176] CPU: 1 PID: 27176 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2160.390477][T27176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2160.400537][T27176] Call Trace: [ 2160.403846][T27176] dump_stack+0x172/0x1f0 [ 2160.408202][T27176] should_fail.cold+0xa/0x15 [ 2160.412893][T27176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2160.418725][T27176] ? ___might_sleep+0x163/0x280 [ 2160.423709][T27176] __should_failslab+0x121/0x190 [ 2160.428669][T27176] should_failslab+0x9/0x14 [ 2160.433189][T27176] __kmalloc+0x2dc/0x740 [ 2160.437451][T27176] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2160.443714][T27176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2160.449970][T27176] ? tls_get_rec+0x104/0x590 [ 2160.454616][T27176] tls_get_rec+0x104/0x590 [ 2160.459054][T27176] tls_sw_sendmsg+0xda5/0x17b0 [ 2160.463862][T27176] ? tx_work_handler+0xf0/0xf0 [ 2160.468648][T27176] ? aa_sk_perm+0x288/0x880 [ 2160.473202][T27176] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2160.479187][T27176] inet_sendmsg+0x147/0x5e0 [ 2160.483703][T27176] ? ipip_gro_receive+0x100/0x100 [ 2160.488833][T27176] sock_sendmsg+0xf2/0x170 [ 2160.493275][T27176] __sys_sendto+0x262/0x380 [ 2160.497797][T27176] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2160.503197][T27176] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2160.508778][T27176] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2160.515050][T27176] ? fput_many+0x12c/0x1a0 [ 2160.519492][T27176] ? fput+0x1b/0x20 [ 2160.523406][T27176] ? ksys_write+0x1cf/0x290 [ 2160.527933][T27176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2160.533518][T27176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2160.538991][T27176] ? do_syscall_64+0x26/0x680 [ 2160.543692][T27176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2160.549780][T27176] __x64_sys_sendto+0xe1/0x1a0 [ 2160.554572][T27176] do_syscall_64+0x103/0x680 [ 2160.559193][T27176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2160.565094][T27176] RIP: 0033:0x458da9 [ 2160.569003][T27176] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2160.588627][T27176] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2160.597060][T27176] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2160.605053][T27176] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2160.613045][T27176] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2160.621035][T27176] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='\xc1\x7f\xbf\x15\x1f7Cbt\x86\xcbc^E\x17\xb8\v\x932<\xd9\xa1\xdb\x1a\x82\xb9\xecS\x87\x1b\x14V\xbd\xe69\xa8\xb0d\x19\xb6\xb8\xa1p\x19\xb5t\xf6~\xd56a.\x12\x1dm\xeea\xaf\x1cFW\xa7a\xaa\x8cN\x8c$\x03\x92N\xa37^\xf7?t\xf7+\xf8\xeb\xf5\xf0\x0f\xf8\x9e\x1f~\x18\xde\xde\xbck\xac\x1b`\xb1\xc8L\xd9\xb2\xce\xb25\xb4\xb3\nE\x7fLJccV\x90R\xe0\xd8\xb2U\xedl?{\x8f\xf4\x1a\xad\xf7\xba\xc5\xd0\x97B3^Lk\x9e\xdd\x9d\xde\xc7r\xc3\xc0\x1fBG\x93]\x97\xd1', 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xffc8) sendfile(r1, r3, &(0x7f0000000100), 0x4ab) [ 2160.629026][T27176] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2160.637437][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.642544][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.643264][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2160.648983][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2160.654822][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.660572][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.666220][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:19:48 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) getsockname(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000001c0)=0xa4) getsockopt$inet_buf(r1, 0x0, 0x3f, &(0x7f0000001400)=""/4096, &(0x7f0000000200)=0x1000) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40050000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x2c, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb7}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaab341aaaa86220f48cdb2dd601bfc97004d8800fe80000000000000d4a38d197c035cb4ff0200006eed9d01b9f028bb4b9482377a8d00000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862532bb0807b4ed1189c06e1cd974bb179fa3dc2dd57951934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff85429e50b32881721afab69cc"], 0x0) poll(&(0x7f0000000240)=[{r1, 0x4002}], 0x1, 0x3e) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 17:19:48 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0x30b}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x6, 0x6, 0x77aee8f7, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000013c0)='TIPC\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000001480)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x24, r2, 0x0, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x52}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x204, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004844}, 0x50) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 17:19:48 executing program 1 (fault-call:9 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:48 executing program 4: r0 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000015c0)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000001600)={@dev={0xac, 0x14, 0x14, 0x14}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x3, [@multicast2, @rand_addr=0x77, @remote]}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', r1}) r3 = socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(r3, &(0x7f000000a340)=[{{0x0, 0xfffffffffffffd25, 0x0}}], 0x1, 0x140, 0x0) 17:19:48 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0xf000}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2161.026058][T27214] FAULT_INJECTION: forcing a failure. [ 2161.026058][T27214] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2161.061577][T27214] CPU: 1 PID: 27214 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2161.069193][T27214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2161.079339][T27214] Call Trace: [ 2161.082654][T27214] dump_stack+0x172/0x1f0 [ 2161.087118][T27214] should_fail.cold+0xa/0x15 [ 2161.091718][T27214] ? __sys_sendto+0x262/0x380 [ 2161.096408][T27214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2161.102227][T27214] should_fail_alloc_page+0x50/0x60 [ 2161.107427][T27214] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2161.112799][T27214] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2161.118442][T27214] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2161.124165][T27214] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2161.129809][T27214] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2161.136158][T27214] alloc_pages_current+0x107/0x210 [ 2161.141292][T27214] skb_page_frag_refill+0x277/0x460 [ 2161.146588][T27214] sk_page_frag_refill+0x55/0x1f0 [ 2161.151632][T27214] sk_msg_alloc+0x10e/0x8d0 [ 2161.156243][T27214] tls_sw_sendmsg+0x63c/0x17b0 [ 2161.161217][T27214] ? tx_work_handler+0xf0/0xf0 [ 2161.165993][T27214] ? aa_sk_perm+0x288/0x880 [ 2161.170516][T27214] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2161.176070][T27214] inet_sendmsg+0x147/0x5e0 [ 2161.180577][T27214] ? ipip_gro_receive+0x100/0x100 [ 2161.185624][T27214] sock_sendmsg+0xf2/0x170 [ 2161.190221][T27214] __sys_sendto+0x262/0x380 [ 2161.194749][T27214] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2161.200218][T27214] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2161.205800][T27214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2161.212133][T27214] ? fput_many+0x12c/0x1a0 [ 2161.216552][T27214] ? fput+0x1b/0x20 [ 2161.220361][T27214] ? ksys_write+0x1cf/0x290 [ 2161.224871][T27214] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2161.230334][T27214] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2161.235797][T27214] ? do_syscall_64+0x26/0x680 [ 2161.240479][T27214] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2161.246569][T27214] __x64_sys_sendto+0xe1/0x1a0 [ 2161.251370][T27214] do_syscall_64+0x103/0x680 [ 2161.255992][T27214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2161.262059][T27214] RIP: 0033:0x458da9 [ 2161.265964][T27214] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2161.285576][T27214] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2161.294012][T27214] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2161.301991][T27214] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2161.309999][T27214] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2161.317995][T27214] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2161.326178][T27214] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) close(r2) r3 = socket(0x800000000000011, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) connect$inet(r2, &(0x7f00000003c0)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000a80)={r4, 0x58, &(0x7f0000000a00)=[@in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x7, @remote, 0x7ff}, @in6={0xa, 0x4e24, 0xfffffffffffffffc, @dev={0xfe, 0x80, [], 0x10}, 0x5ea}]}, &(0x7f0000000ac0)=0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x50) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r5, &(0x7f00000000c0), 0x4557434d) sendfile(r2, r5, 0x0, 0x20000000006) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, 0x0, &(0x7f0000000580)="3ffdea3dde9974f67f46f98a49a3fd68451f11a1f6703759764bf26a978a572ecb4261c6e0e8ed4982723bc4bd556b238c4b50ba714a4de15c4b3c604cab9007e2d0f94b67cf8129461d9b42384127fcf8fc09ba"}, 0x20) sendmsg$alg(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000200)="8935d62ccf366e7e8c7b7dbcca64109b9ad44d0031ff0977c7e2a26c599aafadc2539f30f48ff9f57efe287a378b59d8426e1df11cc30cdbb5b2efdcc57d7d3d007055416d6dab9d2974ad6c96b5cdb8311e1f3de8072a8d2bfee0fa396efadb7ea39ba17ada46a8e76ac6c8479e2fb38bdb6be23cff254803f14efa5df54a3439eae852aa8a241374a0af69892a060793852d890347a895e567fb8536729152c338f961b488b6407e9119b8b3f3a5674b913407", 0xb4}, {&(0x7f0000000640)="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", 0xff}, {&(0x7f0000000740)="7f1ddae771448e0fcc89dc55ecd3fa3d59e7e6c5e39ec7bc66ef9f997be7eac7ec291fd3bd860e4a5c20aa439c3c0bce511f7fb42089b0893a3e32e37fa95967192808c208e9eff6f17abe7c546b950b2404419c3b7b330ae4128c388831b80d3f73043b552df7fd92b90dd20567f242763940111b3e589780ba41d92fe423e7d3e2cbef017b4bee3bcd496602d17a2d5bc13c7127f57d78eeda487180f399e5dbf65a0f5d1c1a4d3c8dfb952361e0bbfebeb6a25728862198107e9b58b79370bbddee08c2999a169c7f32c5b9220f173edf2da68238721f34ed4be14aa2c69e74b514cb7b0422", 0xe7}, {&(0x7f0000000840)="21997ed9e8c8186f853c529b3e286c4c5bfdbdd9e6a61fdfd814dc404104574b3d9a4f7a75d8ae4864781624d06a7aafc6db7a34d6eb8b5444dc1017d8b1a4b99a29bd8e5b8b7756b249d9c5199477e623f1eb322173c9d656", 0x59}, {&(0x7f00000008c0)="4ce9829bf3ba99c028ea80d2dcfc677035802bf9d71c7c97222b134c3ac1c4ccf40f1798cac238d3e114d49ba49b9dd6c3888093d70a481a2d97a9cb3feeefea12752ae9177c7bff87e58e18db00f9384280d50306db393adc56e627638a2fb29350772485fa1874d31a82df78e39896b72a46", 0x73}], 0x5, &(0x7f0000000180), 0x0, 0x11}, 0x20040081) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') 17:19:48 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0a290002020000446daca9598ad68e9247af1862142acdb520458ea423f137291470fbb21ea86fb5897a52e65f8f09f2000000"], 0x10}}, 0x0) r0 = socket$inet(0x2, 0x807, 0x6) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001840)=0x14) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000001880)=@xdp={0x2c, 0x2, r1, 0x2c}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001900)="febab5365d52a6ae3a6d2e9bf4c5e041aac24b82", 0x14}, {&(0x7f0000001940)="06ca1036cf50af54be85f26f2b92c1aa4fd040814827be4064fe49f3916c3713f640c182044fea3d39b8ae7128c61f0a5891b1618b82091c87bedd5d1ab862e6e5bf5c7bfa3cd589f3bbb774cb586e8c6fb1e554d0b41375a862592cabc8e47bb02f0272d548791b2a2a93cf128051a3b74a1b47", 0x74}, {&(0x7f00000019c0)="95ae6dcb05b001bdc1b85dcae21eadc56193be86998b36f20315a581cb38867b08d2ee3e01130d0c5023a1346f03bc89e6e7791cb6f0b4689e17205b23b1231df37d0de645801554e86569f3ac7f4f1b364551618789b285bcc23934f38839887ba4a0220f88f2468326befdc0951b4debcba424d41b530f9bd1dfa379211a7d94f2a45e816b658eb0ab30b60c630fd2472e1c9bf0f72e83a6a451df2d52bd57d22a406da646f7bedcfa61553959ca83cae346162ca4fd1ccb0fcc452c9e4d2a1efcc1aadb092b4e907c051998e4fcf5022bf7cfc43e9f54ffc5c0ad472b4db36e5d2c3fc5e4ef859858", 0xea}, {&(0x7f0000001ac0)="fcc73f07c76dab269b1109d6a4d64b112f425056186d81e55a8fd66b6c1f6caa25272662ff6e4c3f1b85c73da51b7d838bad38c54b2de231c0dac7d94aab9f7c837af79dcd0c4ffd3a855a180b354020acc150b5821fc2fa0bea2f95781054ccbb13866a4d12e91bf555d31eb6028184cade2e6e67587a7ac2e354759ecf7e2674a60ab833ce79fe8d491db1b173e6f23468687f77d2f64c14c000eac871482ddf2538b13e1ae09aeada7560b1a5a4dd6ee743fd3cdff3000f54f4", 0xbb}, {&(0x7f0000001b80)="38114ced8aff961768de8f7841ae310c67a4fe435ca6bd5504b0688385577bb6ca578115fc3e1cb677e0385bd1fdcbe934b48daadc36acee43521755135acad5f67d98daa172f3509c6a57a599d469997f7ae3bb08a40611613c92d324001765584f611a7f8a0fc7dfa9ab799a2efd1e80f82d2e43ad20ddcb66f77d6cadfc019777bf60372c8002a2ae8a2e67368a30ff703097efa0002739fac61f010a480da7156925dd7adf15efd47b5d8ee7e094583e86a5a835d71818991db3168c7b80e5a0319040c22cedf205b1b4e6691b1f9bb6adf0afdda772d08d0b999a4152e5e2eaafbe4e50f99489e6017c5f170b2394fa50", 0xf3}, {&(0x7f0000001c80)="bf245f61af3fc3dbc9a551242d891d884e9d667db29511b6bc6fe6c14ad5682f9fb826f1d0d5fc686d2eccfdbf4c2f274ae12a1f04771f57371f2fec71ffa9efe37b38e345c70c7c2e81f697c35ff10b5348de3a819afcb8aca903493af0acccb361f7e26215819436bed2d9456785ecea1c3e063aae9e33cc5c92f69d8b387c4cb9a2e8d4fa09163416b665f422316fa5f0a109054c7d326daa49c2c573ce9459c0c8869d0fc7bf34bdecfc38709eb70eac4dd50bd0", 0xb6}, {&(0x7f0000001d40)="941ed758b97cf5e860fb496351c9fa074c3f7e65ac08a8a32358331fe4f0bba7f804704d6a558bef0e1eb2e0788e3115ba9c1e30a48e7de9f7700a1365b2a57792068facff73d070bb8e95d13112d7285ff04f0dd76766c8a84055b6835e79dd4b291b025bf784e1c9182860070ab0863a965b68548e9cfe18b7b43aee87addb5420016527cca7fa412e3fdf0461e7c8804c0f12aab0e80ac41523beba27be22d35e647f065d2dea4748ee8f751d36abe4ba5036c5ef42e31b3f865ba4c4b2a09d62d11da10d4342efcda689c0061aea97b4140b99ca5532c399da44a6f8d40069", 0xe1}, {&(0x7f0000001e40)="d159de5ee842b95f19a747086428e2", 0xf}], 0x8, &(0x7f0000001f00)}}], 0x1, 0x20000000) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000023000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000003000500000000000200423b000000000012b478407f8604"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x1ff) sendmmsg(r2, &(0x7f0000000180), 0x400000000000003, 0x0) 17:19:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="860200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:48 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x2, [], 0xffffff1f}, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:48 executing program 1 (fault-call:9 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:48 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f00000064c0)=[{{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000000240)="f041da33a93018c25ae8160f96bec6b762c68ab8135c5371396ba9890ddb08b6e0f7922057ef270d01028fa50dcd3f18fd04f0cc6d31b361bd3a56ba07402e10c3777defe28d5517007c131c115f7044fbde149a89c527f5792ed7225dba508086be0961b665e210ccd05d", 0x6b}, {&(0x7f00000002c0)="7b8df35c12250208c4d6c69cdfad6aeabb8f06d7982ff73892252ebc8bbd37906a33ea116a395c262251a118ff4df84a0814a084fd91a26ec4c4965c5ef67ddc1105bc2ecb4b6ce876dc2f383e0793407dc9a22c59e9e4bec52ee836af0811a1b26ca0a23c4c4c94109447bada4d20f4d87b55b0c31695b0576e5c136dc2b39d6b863e5cfa8a8d01bd1ccc25beae1c3ce02beaed23b571af060919980a551e5d2eeee9810c33677520c950ef304f918eb873bb93e91353e1c6e2e3", 0xbb}, {&(0x7f0000000380)="a8fb480e7bb592ef2bdcf54ebb6f26282bd2aaccd7c3a9b97f23d840e81a933d175e69d1a8fab5b504bb49598a98edf9e9d4c4f9a9e4fddb22f3bf4aa45de8111d3c85176e4ef982a5af0ff47bb39708c3d760d180e9d4cf5cd6596a435a2e05500c417d0fc5edb8663a9a06abf920ea034f49a302151cfe6b9800c32dbc9bb93a4cd2", 0x83}, {&(0x7f0000000440)="41e4ca4b1e29de4d140067969185fb3b0401ad9afa94491d99ee24da97252a4db9a77509c1577d8b6d0e005016a998998d313c5b8cafb3c6d2b92bdd5f8597b5628b636f62252191c721ccf91db7d1a1c0511bdfe195cf21122bee97ccd44698e4de7b4246483d77e576f4fcfa0cb65b44cd52aabdb327e8c065a051ab6e0b464714674102b86422f745c62b5cf961895d14b1c6e0f2cab3a8238f7da60a6bb68982ee3a274b36271eb60abbca5a13832e5ee51d7ea441a0a784b8b08b27bf349c11387565f9b54de6f6ed26f3660e016f5171cdbc10f70b58a5d603ef5ed670b54101103716a5991536467f1c04f48cb5cf45bc519b82", 0xf7}, {&(0x7f0000001580)="497393458116b0a6c3938d7af205dff9738bcd58e23259f749ad5cebf93b669abbe22485e20e6006097271c13029ca04d9df", 0x32}, {&(0x7f00000015c0)="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", 0xfc}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="32ef16a2344ebf7d05010f30b6eaa642", 0x10}, {&(0x7f0000002700)="61caf453729a0881ac3243fc907a1eb430182841111e36c8d575051f009a1089eb3ac545d7259b273e8f51ee1023796ebb4a7d31d8398aaa77c3def009e93545a12976a728106b0c6b9fdb137669ce521599a49f9e2331692ecf860033d0b880c8e2959727be6f435824664f501d33bd30722c888724ea93d4fa5c7c6aa9afd4bd35b7b40e66e2ab384deb08a103c6a8625ae271f49d8d6d1c2758f5c6745d16f0b1900d679a7914069b5c7759a2bc87344cf068fb3101002e7fb26b81aa8a888b5bcc475f60d776d858666cd141aae768d8f1e8ab688f642d5d4b0d66c3070f129f2d6bde3076782692d8e93c4137fd9720731acd65", 0xf6}, {&(0x7f0000002800)="66a4dba1f484f30b9b6d4d205b17476b0fd7889b5e46647478b377b089eab9e8e3cb670dcca0e9e29e997a589464c803923acac809c3a0cc033c92c4ea7691b118f41d8fe1fee166d8888e901a0a55a0f4c938b2885c33a29fd0773faa668028f95568dcd9b65ec6570d03a0c5f92d0ec270eb1c51d08fd68d079e0e49f3036a029bd9b2fe6473ed094a5b3fbe", 0x8d}], 0xa, &(0x7f0000002980)=[{0x80, 0xff, 0x200, "840d8d32cc84ba38083f75dde144104e81109dddab6145dd51674e4c83709b1f0cbc8a17a9d815474b066e8db5eca5490b888b89551c0b5d6ba529531e5bd2b173144fb6e310f7051f23622b3b38fc9e208e53e7afd74f2267f55cec509ea5e3d250397a455ce3cb43cc62d3b2d74b"}, {0x18, 0x115, 0xf2, "2392dacd611195"}, {0xd8, 0x0, 0x6e554719, "6bb43b74b5152e28a0089c92c4281d8550d9097741045257c24234542313da0001197eae9e899f8895054f7ef8a015b4980693922a3a0c8a9b0c2ad57ebdfe96f24212482b12b26cf6e6e2fa8ee777ef981e21d68dcea214e171862ddbbcc99bd2dfc4a9713293bbf1abfc2c6d1fbd6b3b2394ca698c88157f58102c635daba43e7380f01af8d2a79731a1d7918a7785e3af72b37acbac326179ae09e7162f1808c3de7bffe33b0f2866647ec39e00e1752d6ef51c6084b29976071a79e688d60fe11856c0"}, {0x108, 0x84, 0x1000000000000000, "3baefc6f0e07cc1696c50c4c9ee1ab0c7e4c643f16a2d33c6dff54961fa33f47e181632ea424222724648faeeda615c1716cfad9b16f26370dba3594c28dae171ccad8e3737a3507cca4a2d7c84af12e0a80ef67962a41fe846c51bb344d1bcf7e34ce2bf0436436f9d471043c8301b961aad9964ae313376a703af335b10ea2ccfc0114f57ed303b282e471861069f1b3869f9061dddfaa7a49cea7c0052d96c93a3b224a87d8808dfb0ed3f846f9cb3e9f1f0980514d31e16c5f05fc7c1c7d1ee67043f22710740a573658e2848883746be0898d1c1e7ecb7f99bda436b7160cd17f69e6d7e9db65c8f1b1a84b3cb4eb"}], 0x278}}, {{&(0x7f0000002c00)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x30000000000000}}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002c80)="d87ec3ae08966c2c02d98ba8d154e51e7de5128fbd3900b8c808630d172ce91f43db", 0x22}, {&(0x7f0000002cc0)="c5ec4bcf6c0bb94bb0828ecc4eb8ae09c05888d5c123dde9a974455a6fe671ccbf2bcea66fb287bac29d9dfd2891f2756d2ec37e43fb34c479f684cbe73f049380fd9a327e5940e395bd3e3e1c674bd29e94973d6204e24fafaf2485965ad6b9a16649168212303d9687709676ab02f6d6e97368f48af1e8232013fe9e5da8a8c21fac", 0x83}, {&(0x7f0000002d80)="daabdf8c28fe869b2388904c8d5d68d92b941c5d780760295e9cefbe2ec64af923afe90df26f983fad487ba2aa5a023a839d6f8ea4aca63c635977157bc07d031225d783e608d2e8af1de36ed17e540f43676e2be9bcf621484bbb48c6840a9f5b33a4efa7fa6a083a33ec46dfdf7ca537da32cd932865fc41a8c5fddf33c7ec9e1d40934e9d067a8debf8f25a41ebcc8f6be52689a84535408418a271df954927ac03427c2b27346c9076b0677ca2dfc18f87d9346309752fd42179ac0fe38211d797b6", 0xc4}], 0x3}}, {{&(0x7f0000002ec0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000002f40), 0x0, &(0x7f0000002f80)=[{0x10, 0x84, 0x6}, {0x78, 0x10e, 0x1, "67b88214ee6585ab739e5314384d734ce704f3f3575c211c2922a580505a92f6c3929ee01492b41d0f1686fd708bd7a78a49ae3837fe230fa853c8e841535f10aa918b2bc85feea283edbf755309c5bdb16d5531f9929c607d1908ee7a4efc68870edf"}, {0xf8, 0x110, 0x1, "16a6e0f616afac709e5e9095b59f0c551cfc1ec4683866adf54d92834318faff30c3ebbebc70bb4abf053254f8b19812c123a07860db09b0b231d276071bf8178fb822d828addeddfd3ebb634475ba4d45edb215caac9117682256e5b3251afaeed53c03fda2b240074ab01574a5561975993269d4d941b573f19a3ec1b7f93e12290124941f974a274ef9ade69388305b7cd3154a7034c72815255fc5bb412bc52df7dc8f355ef2c676204848109b7ca52bc2e17baa8336ee8c209b12aeee8cbf55ed12f35ec41d3954754adb4e54a264bc5d753c2287103c194ed3beccd95e43"}, {0x108, 0x84, 0x6f12, "83362155009ba625d54abcea7ac0819018a64b23f6bf883354467ad54b2e262657977c392e7143a40d144acaf3acf22da66d7e7a990d8396ffb1a619fd7b903687933fdd0b666167cbbd8442a3a2e29d5d3e4e247c188edc9b87b4c556aaf9ed23cbff3fd50646fa2c33ed40a6298f2d31b16e8e386d5d91309cb6c356fad45b1f850329092949dc822fe53f25e3e208cdbb16b741f866b40c09a1120edad20f5500b89f14fa17ef618217b6baded46f3cce669c01ecb7bb4fca114fc229a142e7696031bd6e8df6b201d28706a7217c73a5f2d4ffe45a27ba67b90064b85175330e091efdc1dad27a5aca37b87b06bdf1226d"}, {0xd8, 0x11c, 0x0, "ba7aab9489607b74b9f9089673c3a40f237d07bc8395a2e7a09a182da6dd06a4e326116900de19ba51261468d92ff35b45ac23c72254e1b8bbf1dd44136ed99b00bb16e8c0de8a449e0fc1c71095bb806950acdb9d049bbdd4b798c45021a320bceb8bd88c4b8d03266d929728025f54020acf3971df36ecb5f26bca927dd55bc99c834ead8d53a1a6c33f25ea48469a12cf5b5048efe8c59a0426413418941d947b1a8edeb72fa1d47064bf3b748816f6ca26e4b9db783da7f6cd5ec1d21aff538ebd82bb"}, {0x78, 0x1, 0x7, "35754ebb3dd53e9c34ba114037b94b829d7b4d7896e93e253ed4bd9cdd2e58533f256f4bb445380b4391e1711ca1a9c4e49e0f8fee4d9f40cef8b5090a4ed472513180fca670c2813d0aaa17ebcf0d930cec20bff9ade746761e9224d107bac6781953d1b2d0beee"}], 0x3d8}}, {{&(0x7f0000003380)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000003680)=[{&(0x7f0000003400)="a99a4f878380ca1dda4202195e62419768d91a5900cede0138461cffc0ad1be474ed87cd309da042e2a90154afcbe124b1d591d7fc830b15377ab40d6c7431857a59a14c73a0517991c207b5948529c889700901c8469ad737a575e53ee7c4d7d09a629a2e5456492c65c1ab83d8ba77baf2ba69b35bcfbe7d70f81984921e81031a9626248fe1be37d329ba9f67fcaa2d853f2c11f4850e5dc9e5897b436209d06e4141fe48c67e96936f1cf9706580831b34aca0801da488caa67e40672e1135c44c6ce54d055a8142f4345864", 0xce}, {&(0x7f0000003500)="4c5d54e9a02d85b305d41b9e969b", 0xe}, {&(0x7f0000003540)="6506a27fefca015c18bd57133b2d699464eb82e72bd1464d8b8a081e7fca8e86e0bcefbcafcbdf93710e8575cb808b9abcbc4031c59f5f01004e0cca27fb12136ea3ba7c4298fa41dc8fc264bd3e627ca90b63d38540dcfbd7a731b66fc44ac23e91b5153d5d3c", 0x67}, {&(0x7f00000035c0)="3c5fcf76329e21c4a054590c6a6e071b236e212a839f58cae0538b39e6f96c857bf9682e287d75ff9fc9112a00c52a12cc27f8776246cb46b5405ff52c1007201ce3e7208bd25307065a7c96b1a29ebb3874c2c546b0d3ecb965952bd29cefcfd2c2dd75d92cbe8a30e70d6082bdd4a4358e8efafb9da91263d021f114ed8ae2f3c87d25dc5ca906485d8aad504f", 0x8e}], 0x4}}, {{&(0x7f00000036c0)=@pptp={0x18, 0x2, {0x2, @multicast2}}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000003740)="bdc184d30beaaeb13da4a3d639000b38166440f48e88a6ff7da310c0bbe86d237be4de4744ee1642cc18c7324e903dfc341ad36a14da0f7ae85cfd0e2a7aa86a50d5c15efba8f8b8843024f786ecafe510ea23ce51ddfe5b299151d9f11765ad02926eaacfc395fd93fd7fa72356747f9a9fddb62e79108125a4446b71334e6c88667d650589", 0x86}, {&(0x7f0000003800)="5998be54c37f03f92c3396dedc1baf4ba69d3f0bf3d40219d9ddad4ba94cf31ec7cac0569670e01d74954d69617a2d1ec7a857d30d59b9583341623d4c354fb29c33533dcdd147822eb7979aae0f3bc6ecde86303ac64468587cef0549edb5075d6e328e9f610d060e74114a803f7282cd95291bc1817a0a401c031d917c86f8e00df2a9ca90b5103804e6dddc59f0f23cec6a54d0937a5410d5a67511a3daac1e232e6444b214a2bb4b0d5879b362afb165cd8dcfd332308d7f752323276dced1fc2a94de7f7d85ee6b5d506f105dbf26b014c28749c8a368fd5efcba716347ab797caa3765f1380ab0ed745e4a75b982b92f7202e9e58e20", 0xf9}, {&(0x7f0000003900)="ba14cd3e66d60a0ad1354fbb9430a461189d7241b3d5db564f055c93bb91f0d44058c5baae792280e7efabaa4b904d72966b8b85d4dd", 0x36}, {&(0x7f0000003940)="e3536e5ad365c49c009bf1bf1b01633e7b61d47ba1628cc1eb8e1a92f0be8c24c63ecdfd271fc5c22b853b65b6efb031fff056357f75676790b8fcbc9dcd28baaf692d22f25b31d553927a892811c0cd641f3542b4dfc863415073b146a21e7c677f85e3fbe15cb608177a2223facad78d681f899e63a070af4ded10ef451f79313df69584c83235d55c68f70eef7add1f74", 0x92}, {&(0x7f0000003a00)="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", 0x1000}, {&(0x7f0000004a00)="b9af5cf0461b84ebe1167f44b66b232388e697b016feb581faa42dbb1c6725ed9508049d912cfdb90560d577eb242176dd95029015c459a89799e063d3e2d1a4c0d5037b2245542b703c94fd87f53fc63293a3b150d4590a3e75dee2bd6e193e9d", 0x61}, {&(0x7f0000004a80)="2c8ea587dcdff85d9f888d29d9d50690e5b714604fc6d3f000cdcd6ba8d2369f5505c64ddf817e9321b879c86162eb2bfa656035c5bc788356b3312bdd6dfa9d1c5441e68deffa281765b4d49ca7bbd3a43b9095723d57d64c13d0ac336545e96e28b0aa00298f8c35ffddd4cf95bc1675d0e00da6ae0827db0ee99d0904fc8b837fb28a8f7b174a5042e6a3312c920d9ac94900bfd7824fb18fef716cd966f91367af84df65476aac8779", 0xab}], 0x7}}, {{0x0, 0x0, &(0x7f0000004c80)=[{&(0x7f0000004bc0)="0a0fb821bd60150fe8111c0ca48aa1b9fbc39a8f4ddb699a60b75b0f0d939d3f7145570e9a46246bae219d176737c26d32bd39f6640e518a2135e62b435350f6b72f64c0101d3950e7d1a7bbd9ae9226e313185889ee3034c9f05d4273713930677f6fd2ea5d880f412b6939b950e50a24145b0f7ac9b00d934e200bd0c99e79b21092f071afd4a16c83935e462c7983f91a2e9a529509d0ba1d46c280646884f1d02d00803dce378ae44a", 0xab}], 0x1, &(0x7f0000004cc0)=[{0xd8, 0x13f, 0x4000, "1adb9b2598ed4fbc078b5a7cd2d32776d0498e5e53cca617ec464c69ae130bfd1c4a17138c008b5161df2c641710af5f31537a29d7f9d5661f5209fff5d2e52cb0e8ee8833a07788bd082e09026a51d81845913f412e61070a440311616ddb3d02165c1bf594f77d9444fc39bd0f78e7586d52a22a344f5842c37f56c14f9b811860a95fa4a83cb045ebdbe5431c896fd5e29945e305c6895d736fb73f6bf0ad47a7ddb84513a55656215ef862df059d37ea6ddf454ad582a9851fc06ccace143fb3"}], 0xd8}}, {{&(0x7f0000004dc0)=@pppoe={0x18, 0x0, {0x0, @random="a5234c27edf8", 'veth1_to_team\x00'}}, 0x80, &(0x7f0000006280)=[{&(0x7f0000004e40)="109701d38e378f0c7d0f03220f584b1e6eadf30d0cceb0265e20c55c6163b9509c3fe48e5da0718ab12e75b6b1ac05c183096f8967ba", 0x36}, {&(0x7f0000004e80)="0e0835d0ecbc68fecd8cd7050e4bd6d62359481724b9634b2f603e02d7070eb418f106357bd31feab4ebf0c6", 0x2c}, {&(0x7f0000004ec0)="ad46e837cb856f45df400edc5be81818c0d5766591d8c3c619df22b926eb3f4869096ff0a84d080dedf05af08da5d83240e53964377529cbcaaa4131592d29247ae6de47b43058bcbb6203309c400fa70e55c429964dda667c983479e59aba03431bd6726e8f7b5cc90caaa80b426d06217d40b60e7d6d06f57d450f7c417c7a8b", 0x81}, {&(0x7f0000004f80)="cb233628a48c3c47fdecb2114ac4d8cdb8997e6778d7e9c72209e35c4427488be5105af0e4a3bee4e7a69018faad44cd", 0x30}, {&(0x7f0000004fc0)="bf8fa7de5b8c7ba09b84e6300787cb9d73a1824909a3b8b0eb54613c0805d1b8d68b22832299f9aa8d5200b074b8644b0394785185f134a99d6ce0f314665ee73ac8b3b4520f30d8884b82507bea80882d4d65b13c9b7e86e628968cec6b576923b0a25ae978808005677cdd02c00eaa96ed8fb06b47843f0cee80f5b63d11fc1c19ea0ca407a131d8bd914618909b8d397b2adb95ab830523fa", 0x9a}, {&(0x7f0000005080)="51b4262aa1e813eb1f2573b01e9712cd589f4f45b754b17a0b24dce9654a261a7680f1e838070fc005263801fd9f1185", 0x30}, {&(0x7f00000050c0)="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", 0x1000}, {&(0x7f00000060c0)}, {&(0x7f0000006100)="0104ce0b6f5970239232ea23ffd9980cf89b4ca6ee2ecf8d5ae9477d68fbff84100a95bc466a6f7cce0f309bd16026b97f7e59b9f4cd5150c4de758c892ce4c890f1f9fad8e5ae08e8ba9c37021952660d61390818f202588dc1b57348ccd080fa93c1bbf8ee350aee1d7ddb964b70beca234d95e8be9a4d7c026c2f86102ef92ec73bb906db7e48adac6ace9ef9fc30d99853e4f085559495055aa72d4ffb1f9a4863c736fcd42815eba0baf8919ea579dccdd326391dd05167e4cea8ef450a5aac5842e195c444619f375ec4b8fe16c82fe4ad3493b3b200d43264b980615219e6ceab0122c216b571", 0xea}, {&(0x7f0000006200)="20f739714d747a1820ec8e4a3bbe787e3371ab3748b1b7b03f1194922db730397e639d307fe0e56fc624f560d8463520210c67d7c46c2dd9991a7bd33a65807f6e1a9a647a63fc44ae6667bcefb3", 0x4e}], 0xa, &(0x7f0000006340)=[{0x110, 0x18b, 0x100, "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"}, {0x38, 0x114, 0x4, "ee8bc69773d0879c6d9f34fe530efd90fc451fd2eecbfcffbbcab3b3a156643d007c0e92b5a297"}], 0x148}}], 0x7, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x24, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x1dd, 0x0) 17:19:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") accept$inet6(r0, 0x0, &(0x7f0000000080)) sendto$inet6(r0, 0x0, 0x0, 0x8003, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) [ 2161.639217][ C0] net_ratelimit: 2 callbacks suppressed [ 2161.639228][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2161.670780][T27231] FAULT_INJECTION: forcing a failure. [ 2161.670780][T27231] name failslab, interval 1, probability 0, space 0, times 0 [ 2161.697837][T27231] CPU: 0 PID: 27231 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2161.705436][T27231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2161.715498][T27231] Call Trace: [ 2161.715527][T27231] dump_stack+0x172/0x1f0 [ 2161.715550][T27231] should_fail.cold+0xa/0x15 [ 2161.715571][T27231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2161.715610][T27231] ? ___might_sleep+0x163/0x280 [ 2161.738442][T27231] __should_failslab+0x121/0x190 [ 2161.743392][T27231] should_failslab+0x9/0x14 [ 2161.743411][T27231] __kmalloc+0x2dc/0x740 [ 2161.743434][T27231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2161.758445][T27231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2161.764703][T27231] ? tls_get_rec+0x104/0x590 [ 2161.769307][T27231] tls_get_rec+0x104/0x590 [ 2161.773743][T27231] tls_sw_sendmsg+0xda5/0x17b0 [ 2161.778536][T27231] ? tx_work_handler+0xf0/0xf0 [ 2161.783314][T27231] ? aa_sk_perm+0x288/0x880 [ 2161.787843][T27231] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2161.787872][T27231] inet_sendmsg+0x147/0x5e0 17:19:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0xa, 0x1, 0x6) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040), 0x2) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0x8001, 0x9}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clock_gettime(0xfffffffffc, &(0x7f0000006800)) [ 2161.797938][T27231] ? ipip_gro_receive+0x100/0x100 [ 2161.803151][T27231] sock_sendmsg+0xf2/0x170 [ 2161.803170][T27231] __sys_sendto+0x262/0x380 [ 2161.803189][T27231] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2161.803208][T27231] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2161.803235][T27231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2161.803249][T27231] ? fput_many+0x12c/0x1a0 [ 2161.803263][T27231] ? fput+0x1b/0x20 [ 2161.803275][T27231] ? ksys_write+0x1cf/0x290 [ 2161.803292][T27231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2161.803305][T27231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2161.803321][T27231] ? do_syscall_64+0x26/0x680 [ 2161.803336][T27231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2161.803354][T27231] __x64_sys_sendto+0xe1/0x1a0 [ 2161.803373][T27231] do_syscall_64+0x103/0x680 [ 2161.803394][T27231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2161.803405][T27231] RIP: 0033:0x458da9 17:19:49 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x2, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2161.803421][T27231] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2161.803429][T27231] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2161.803443][T27231] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2161.803452][T27231] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2161.803460][T27231] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2161.803468][T27231] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2161.803476][T27231] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect$unix(r1, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmmsg(r2, &(0x7f0000004140)=[{{&(0x7f00000009c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000a40)=""/108, 0x6c}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000000740)=""/28, 0x1c}], 0x3, &(0x7f0000000b00)=""/185, 0xb9}, 0x8}, {{&(0x7f0000000bc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000000c40)=""/128, 0x80}], 0x1, 0xffffffffffffffff}, 0xff}, {{&(0x7f0000002d80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000002e00)=""/250, 0xfa}, {&(0x7f0000002f00)=""/140, 0x8c}, {&(0x7f0000002fc0)=""/232, 0xe8}, {&(0x7f00000030c0)=""/113, 0x71}, {&(0x7f0000003140)=""/121, 0x79}], 0x5, &(0x7f0000003240)=""/81, 0x51}, 0x7}, {{&(0x7f00000032c0)=@caif=@rfm, 0x80, &(0x7f0000003380)=[{&(0x7f0000003340)=""/6, 0x6}], 0x1, &(0x7f00000033c0)=""/110, 0x6e}, 0x6}, {{&(0x7f0000003440)=@caif=@rfm, 0x80, &(0x7f0000003500)=[{&(0x7f00000034c0)=""/42, 0x2a}], 0x1, &(0x7f0000003540)=""/157, 0x9d}, 0x7e}, {{&(0x7f0000003600)=@alg, 0x80, &(0x7f0000003880)=[{&(0x7f0000003680)=""/47, 0x2f}, {&(0x7f00000036c0)=""/110, 0x6e}, {&(0x7f0000003740)=""/57, 0x39}, {&(0x7f0000003780)=""/125, 0x7d}, {&(0x7f0000003800)=""/93, 0x5d}], 0x5}, 0x101}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000003900)=""/108, 0x6c}, {&(0x7f0000003980)=""/254, 0xfe}, {&(0x7f0000003a80)=""/69, 0x45}, {&(0x7f0000003b00)=""/238, 0xee}, {&(0x7f0000003c00)=""/255, 0xff}, {&(0x7f0000003d00)=""/98, 0x62}, {&(0x7f0000003d80)=""/29, 0x1d}], 0x7, &(0x7f0000003e40)=""/214, 0xd6}, 0x3}, {{&(0x7f0000003f40)=@ll, 0x80, &(0x7f0000004000)=[{&(0x7f0000003fc0)=""/10, 0xa}], 0x1, &(0x7f0000004040)=""/231, 0xe7}, 0xae}], 0x8, 0x1, &(0x7f0000004340)={0x77359400}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000004380)=[@in6={0xa, 0x4e20, 0x80000000, @mcast2}, @in6={0xa, 0x4e20, 0x1f, @rand_addr="8172a78319acad7c27e420ed27c6eed3", 0xff}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x847}], 0x74) r4 = accept(r2, 0x0, 0x0) write(r4, &(0x7f00000000c0)='\a', 0x1) recvmmsg(r1, &(0x7f0000000cc0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2, 0x0) sendmsg$rds(r4, &(0x7f0000000980)={&(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000240)=""/203, 0xcb}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/44, 0x2c}, {&(0x7f0000000400)=""/146, 0x92}], 0x4, &(0x7f0000000840)=[@zcopy_cookie={0x18, 0x114, 0xc, 0x9}, @cswp={0x58, 0x114, 0x7, {{0x1f, 0xad9f}, &(0x7f0000000340)=0xcf8d, &(0x7f00000004c0)=0x3, 0x1000, 0x790d9d, 0x1, 0xbe41, 0x71, 0x7}}, @fadd={0x58, 0x114, 0x6, {{0x401, 0x85}, &(0x7f0000000500)=0xffffffffffffff01, &(0x7f0000000540), 0x1, 0x5, 0x0, 0xffffffffffffff81, 0x2, 0x101}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x8ca5}, @rdma_args={0x48, 0x114, 0x1, {{0x8ff, 0x5}, {&(0x7f0000000580)=""/253, 0xfd}, &(0x7f0000000800)=[{&(0x7f0000000680)=""/143, 0x8f}, {&(0x7f0000000740)}, {&(0x7f0000000780)=""/127, 0x7f}], 0x3, 0x1, 0x8}}], 0x128, 0x40800}, 0x1) 17:19:49 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x3, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:49 executing program 1 (fault-call:9 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2162.088130][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2162.103981][T27248] FAULT_INJECTION: forcing a failure. [ 2162.103981][T27248] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.142334][T27248] CPU: 1 PID: 27248 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2162.149937][T27248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2162.160007][T27248] Call Trace: [ 2162.163321][T27248] dump_stack+0x172/0x1f0 [ 2162.167675][T27248] should_fail.cold+0xa/0x15 [ 2162.172288][T27248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2162.178122][T27248] ? ___might_sleep+0x163/0x280 [ 2162.183003][T27248] __should_failslab+0x121/0x190 [ 2162.187961][T27248] should_failslab+0x9/0x14 [ 2162.192493][T27248] kmem_cache_alloc_node+0x264/0x710 [ 2162.197818][T27248] __alloc_skb+0xd5/0x5e0 [ 2162.202160][T27248] ? skb_trim+0x190/0x190 [ 2162.202176][T27248] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2162.202189][T27248] ? tcp_enter_memory_pressure+0x130/0x130 [ 2162.202208][T27248] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2162.218161][T27248] sk_stream_alloc_skb+0x326/0xd80 [ 2162.218186][T27248] do_tcp_sendpages+0xafa/0x1b70 [ 2162.234068][T27248] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2162.239388][T27248] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2162.245126][T27248] tls_push_sg+0x1de/0x680 [ 2162.245153][T27248] tls_tx_records+0x3c8/0x760 [ 2162.254340][T27248] tls_push_record+0x1f67/0x3580 [ 2162.254372][T27248] ? tls_tx_records+0x760/0x760 [ 2162.254389][T27248] ? lock_downgrade+0x880/0x880 [ 2162.254404][T27248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2162.254424][T27248] ? kasan_check_read+0x11/0x20 [ 2162.269052][T27248] bpf_exec_tx_verdict+0xe30/0x1280 [ 2162.280215][T27248] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2162.280236][T27248] ? tls_push_record+0x3580/0x3580 [ 2162.291205][T27248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2162.303340][T27248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2162.303357][T27248] ? sk_msg_alloc+0x62d/0x8d0 [ 2162.303383][T27248] tls_sw_sendmsg+0x107c/0x17b0 [ 2162.303414][T27248] ? tx_work_handler+0xf0/0xf0 [ 2162.317902][T27248] ? aa_sk_perm+0x288/0x880 [ 2162.317940][T27248] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2162.327664][T27248] inet_sendmsg+0x147/0x5e0 [ 2162.327680][T27248] ? ipip_gro_receive+0x100/0x100 [ 2162.327702][T27248] sock_sendmsg+0xf2/0x170 [ 2162.337746][T27248] __sys_sendto+0x262/0x380 [ 2162.347245][T27248] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2162.347258][T27248] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2162.347275][T27248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2162.347284][T27248] ? fput_many+0x12c/0x1a0 [ 2162.347292][T27248] ? fput+0x1b/0x20 [ 2162.347300][T27248] ? ksys_write+0x1cf/0x290 [ 2162.347311][T27248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2162.347319][T27248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2162.347328][T27248] ? do_syscall_64+0x26/0x680 [ 2162.347338][T27248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2162.347348][T27248] __x64_sys_sendto+0xe1/0x1a0 [ 2162.347359][T27248] do_syscall_64+0x103/0x680 [ 2162.347370][T27248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2162.347377][T27248] RIP: 0033:0x458da9 [ 2162.347386][T27248] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2162.347391][T27248] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2162.347399][T27248] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2162.347404][T27248] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2162.347409][T27248] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2162.347414][T27248] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2162.347419][T27248] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) tee(r0, r1, 0xac, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000640)=0xa8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r3, &(0x7f0000000600)=[{{&(0x7f0000000100)=@llc={0x1a, 0x7, 0xfffffffffffffff7, 0x9, 0x7, 0xe2}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)="a667c6b2560d1bc6d3c489f5e8a71866574fbfe773e99342541f6a5a2cd1b0fcf269fb5a4c96e9876cfb72d4102dc595e00de455af3222b8a4d31814ddba5ee57fc5aec513a6bee8bf4150fa0391d1b7cb934e767457f670bfdd63d6cc27d714525586aabf5551164fa5a9dc9a83e52645d076bd058d1f8b8550a128726f0fe30b37fb0941615b7b46d56ed3e1fb1ae9f4daf6e736bb492fc6eada694f251c085bca6b0a432e1a4ae0843e880c0bee3c8c78d1e710f5cb02617ba3ef80588b57c70abb", 0xc3}], 0x1, &(0x7f0000000400)=[{0x100, 0x10d, 0x7dfc75a3, "751ed7ae6f363986ed144c56085dd097af1e62317c96aeddf9939d5dd02fb1769c3c2464d578c129a2fe9f6fc801ce6328110086942c39654804803dc957186dd8210fc9cf6d02ba37388d6d606efff7c7422d37d338d42174637b94a073c8e60e545eb34a13f556718b41736fb87bdb224a1e954465c5f3c03eb52ea438694465ee93063588328e0457cf28f78c32345c0d4f3ae05aee115e694c811ee49856e1d282f557790c1e0cdff69110f7c6e305431f5c301a199a847c0fd4a7fa277f62d93b368a5616efe8281dc72652dc3772ddad41e412c7b2fa64293d96381f635dd02acb2da445fa3c731b"}, {0xf8, 0x1, 0x2, "64794224b4ce3f8af125426363fa62924d138c9443742a06508f40ec219eb58c0bf7ed1497626811e543de9e51ac8d572e977d1e98de0dd48b8333dfdbece1f275f68418732968a91f99dbe130284c2eb72a38b7dbab6eb7875d92a952c3a5a6c5c61889fc221682ad1d4f54e83416fda9e598cfd24547448c67d52ab8662b81e88350236a0a6b304874678d00138867bc80a65dfa8d5a79d50cff1c9b730959dafa122877ac6f3680474c19a845a0928fffc4493e2f1a497487dff2a278bc0a6152ebe02e39a58b721ddb1c923865d80103332d773fdaf4546da8ed93099724f5cba611"}], 0x1f8}}], 0x4000190, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) recvmsg(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000001c0)=""/222, 0xf}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000900)={0x0, 0x8, 0xfffffffffffff7cc, 0x6, 0xfffffffffffffffc, 0x5, 0x9, 0x1, {0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x5, 0x6, 0x43, 0x4, 0x7f}}, &(0x7f00000009c0)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000a00)={r6, 0xbfc0000000000000, 0x6, 0x101}, &(0x7f0000000a40)=0x10) bind$inet(r4, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) setsockopt(r4, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r4, &(0x7f0000adf000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000a80)={r5, 0x81}, 0x8) sendmsg$alg(r4, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) getpeername(r0, &(0x7f0000000040)=@un=@abs, &(0x7f00000000c0)=0x80) bind$vsock_dgram(r4, &(0x7f0000000b40)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000680)={'vcan0\x00', 0x0}) recvmmsg(r3, &(0x7f0000007480)=[{{&(0x7f0000000ac0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000b40)}, {&(0x7f0000000b80)=""/84, 0x54}, {&(0x7f0000000c00)=""/20, 0x14}, {&(0x7f0000000c40)=""/122, 0x7a}], 0x4, &(0x7f0000000d00)=""/161, 0xa1}}, {{&(0x7f0000000dc0)=@caif=@dgm, 0x80, &(0x7f0000001080)=[{&(0x7f0000000ec0)=""/242, 0xf2}, {&(0x7f0000000fc0)=""/166, 0xa6}, {&(0x7f0000000e40)=""/44, 0x2c}], 0x3, &(0x7f00000010c0)=""/228, 0xe4}, 0x3}, {{&(0x7f00000011c0)=@ipx, 0x80, &(0x7f0000002440)=[{&(0x7f0000001240)=""/67, 0x43}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/57, 0x39}, {&(0x7f0000002300)=""/34, 0x22}, {&(0x7f0000002340)=""/225, 0xe1}], 0x5, &(0x7f00000024c0)}, 0x3}, {{&(0x7f0000002500)=@nfc_llcp, 0x80, &(0x7f0000002680)=[{&(0x7f0000002580)=""/51, 0x33}, {&(0x7f00000025c0)=""/155, 0x9b}], 0x2, &(0x7f00000026c0)=""/177, 0xb1}, 0x3f}, {{&(0x7f0000002780)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002800)=""/1, 0x1}, {&(0x7f0000002840)=""/130, 0x82}, {&(0x7f0000002900)=""/111, 0x6f}, {&(0x7f0000002980)=""/14, 0xe}], 0x4}, 0x7}, {{&(0x7f0000002a00)=@un=@abs, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002a80)=""/105, 0x69}, {&(0x7f0000002b00)=""/191, 0xbf}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/157, 0x9d}, {&(0x7f0000003c80)=""/210, 0xd2}], 0x5}, 0x3ff}, {{&(0x7f0000003e00)=@pppol2tpv3in6, 0x80, &(0x7f0000006100)=[{&(0x7f0000003e80)=""/207, 0xcf}, {&(0x7f0000003f80)=""/51, 0x33}, {&(0x7f0000003fc0)=""/139, 0x8b}, {&(0x7f0000004080)=""/71, 0x47}, {&(0x7f0000004100)=""/4096, 0x1000}, {&(0x7f0000005100)=""/4096, 0x1000}], 0x6}, 0x60fdedf8}, {{&(0x7f0000006180)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000007340)=[{&(0x7f0000006200)=""/168, 0xa8}, {&(0x7f00000062c0)=""/4096, 0x1000}, {&(0x7f00000072c0)=""/71, 0x47}], 0x3, &(0x7f0000007380)=""/254, 0xfe}, 0x2}], 0x8, 0x10000, &(0x7f0000007680)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000800)={{{@in=@broadcast, @in, 0x4e23, 0x6, 0x4e23, 0x6, 0xa, 0x20, 0x80, 0x8, r7, r8}, {0x8000, 0x9, 0x3, 0x0, 0x2, 0x3, 0x7fff, 0xd67}, {0x2, 0xfffffffffffffeff, 0x8, 0xfffffffffffff120}, 0xfffffffffffffffe, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in6=@mcast1, 0x4d3, 0x32}, 0xa, @in6=@mcast1, 0x3502, 0x0, 0x3, 0xffff, 0x7, 0x4}}, 0xe8) 17:19:50 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="870200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000200), 0x9e0819dd) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="ae2159416805c688e6685ba3feef2ed98d42d799932d38389eaca8eb9446a19746b9a4f4f182fe278be29e209530f674", 0x30}, {&(0x7f0000000080)="4e6bb9", 0x3}], 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x640}, 0x4000) 17:19:50 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @random="ba4b976fff68", [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff94, 0x9, 0x0, 0x0, 0x0, 0xf0ffff}}}}}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)="ad566c74b221d4067f38268bea4bc04e760c1d2ebd99a7c4d22eb4c2af2f47c182672df1ed9b3c3a2437c03034aafc97a9f1e62fb972baf241481c25acfa18b969af54", 0x43}, {&(0x7f0000000140)="0fdeaf83831d508721c172be8c3f2a41da52731cf9e89da5dcfd5fcba8fcd59c68b743c5f1a48550f2fbbddb45a8c0f80b1f36b6fee797e2", 0x38}], 0x2, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) socket$inet(0x2, 0x2, 0xe39) socket$inet(0x2, 0x1, 0x7) 17:19:50 executing program 1 (fault-call:9 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:50 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x5, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:50 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x6, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2163.689777][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2163.714343][T27281] FAULT_INJECTION: forcing a failure. [ 2163.714343][T27281] name failslab, interval 1, probability 0, space 0, times 0 [ 2163.772826][T27281] CPU: 0 PID: 27281 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2163.780438][T27281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2163.790518][T27281] Call Trace: [ 2163.793831][T27281] dump_stack+0x172/0x1f0 [ 2163.798276][T27281] should_fail.cold+0xa/0x15 [ 2163.802887][T27281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2163.808726][T27281] ? ___might_sleep+0x163/0x280 [ 2163.813692][T27281] __should_failslab+0x121/0x190 [ 2163.818657][T27281] should_failslab+0x9/0x14 [ 2163.823190][T27281] kmem_cache_alloc_node_trace+0x270/0x720 [ 2163.829031][T27281] __kmalloc_node_track_caller+0x3d/0x70 [ 2163.834684][T27281] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2163.840082][T27281] __alloc_skb+0x10b/0x5e0 [ 2163.844534][T27281] ? skb_trim+0x190/0x190 [ 2163.848875][T27281] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2163.854634][T27281] ? tcp_enter_memory_pressure+0x130/0x130 [ 2163.860465][T27281] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2163.866301][T27281] sk_stream_alloc_skb+0x326/0xd80 [ 2163.871518][T27281] do_tcp_sendpages+0xafa/0x1b70 [ 2163.876494][T27281] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2163.881807][T27281] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2163.882399][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2163.887543][T27281] tls_push_sg+0x1de/0x680 [ 2163.893379][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2163.897688][T27281] tls_tx_records+0x3c8/0x760 [ 2163.903617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2163.908247][T27281] tls_push_record+0x1f67/0x3580 [ 2163.914068][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2163.918907][T27281] ? tls_tx_records+0x760/0x760 [ 2163.929480][T27281] ? lock_downgrade+0x880/0x880 [ 2163.934372][T27281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2163.940652][T27281] ? kasan_check_read+0x11/0x20 [ 2163.945531][T27281] bpf_exec_tx_verdict+0xe30/0x1280 [ 2163.950782][T27281] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2163.956523][T27281] ? tls_push_record+0x3580/0x3580 [ 2163.961734][T27281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2163.967998][T27281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2163.974256][T27281] ? sk_msg_alloc+0x62d/0x8d0 [ 2163.978958][T27281] tls_sw_sendmsg+0x107c/0x17b0 [ 2163.983847][T27281] ? tx_work_handler+0xf0/0xf0 [ 2163.988641][T27281] ? aa_sk_perm+0x288/0x880 [ 2163.993176][T27281] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2163.998744][T27281] inet_sendmsg+0x147/0x5e0 [ 2164.003282][T27281] ? ipip_gro_receive+0x100/0x100 [ 2164.008341][T27281] sock_sendmsg+0xf2/0x170 [ 2164.012803][T27281] __sys_sendto+0x262/0x380 [ 2164.017423][T27281] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2164.022826][T27281] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2164.028402][T27281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2164.034700][T27281] ? fput_many+0x12c/0x1a0 [ 2164.039143][T27281] ? fput+0x1b/0x20 [ 2164.043058][T27281] ? ksys_write+0x1cf/0x290 [ 2164.047585][T27281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2164.053258][T27281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2164.058749][T27281] ? do_syscall_64+0x26/0x680 [ 2164.063453][T27281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2164.069560][T27281] __x64_sys_sendto+0xe1/0x1a0 17:19:51 executing program 5: socket$inet(0x2, 0x5, 0x5) [ 2164.074358][T27281] do_syscall_64+0x103/0x680 [ 2164.079354][T27281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2164.085353][T27281] RIP: 0033:0x458da9 [ 2164.089259][T27281] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2164.108892][T27281] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 17:19:51 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @random="ba4b976fff68", [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff94, 0x9, 0x0, 0x0, 0x0, 0xf0ffff}}}}}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)="ad566c74b221d4067f38268bea4bc04e760c1d2ebd99a7c4d22eb4c2af2f47c182672df1ed9b3c3a2437c03034aafc97a9f1e62fb972baf241481c25acfa18b969af54", 0x43}, {&(0x7f0000000140)="0fdeaf83831d508721c172be8c3f2a41da52731cf9e89da5dcfd5fcba8fcd59c68b743c5f1a48550f2fbbddb45a8c0f80b1f36b6fee797e2", 0x38}], 0x2, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) socket$inet(0x2, 0x2, 0xe39) socket$inet(0x2, 0x1, 0x7) [ 2164.117324][T27281] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2164.125312][T27281] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2164.133303][T27281] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2164.141383][T27281] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2164.149367][T27281] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:51 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x7, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2164.202382][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2164.208216][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:51 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x1a9, 0x0, 0x0, 0x0, 0x2c4}, 0x10122) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040)=0x3, 0x4) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x1f) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000180)='7o0', 0x3}], 0x1) 17:19:51 executing program 2: r0 = socket$inet(0xa, 0x803, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3, @initdev}, 0x10) listen(r0, 0x100000001) getpeername(r0, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x1, 0x4) 17:19:51 executing program 4: r0 = socket$inet6(0xa, 0x800000806, 0x0) r1 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) connect$ax25(r1, &(0x7f0000000180)={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118) 17:19:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="880200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:52 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:52 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001600), 0x80800) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000026c0)={'filter\x00', 0x0, 0x3, 0x1000, [], 0x7, &(0x7f0000001640)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000016c0)=""/4096}, &(0x7f0000002740)=0x78) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000180)=""/237, &(0x7f0000000000)=0xed) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000100)={'b\x00', 0x0, 0x0, 0x15, [], 0x0, 0x0, 0x0}, &(0x7f0000000080)=0x78) 17:19:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$nl_generic(0x10, 0x3, 0x10) accept4$inet(r1, 0x0, &(0x7f00000000c0), 0x800) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x33, 0x829, 0x0, 0x0, {0x2, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0x2c}}, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='veth0_to_team\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @dev}}) 17:19:52 executing program 1 (fault-call:9 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0xffffff19) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="000100020300000000cac9ddd0555074"]) socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 2165.099302][T27337] openvswitch: netlink: Message has 16 unknown bytes. [ 2165.121840][T27338] FAULT_INJECTION: forcing a failure. [ 2165.121840][T27338] name failslab, interval 1, probability 0, space 0, times 0 [ 2165.152459][T27338] CPU: 1 PID: 27338 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2165.160054][T27338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2165.170137][T27338] Call Trace: [ 2165.173462][T27338] dump_stack+0x172/0x1f0 [ 2165.177850][T27338] should_fail.cold+0xa/0x15 [ 2165.182487][T27338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2165.188336][T27338] ? ___might_sleep+0x163/0x280 [ 2165.193210][T27338] __should_failslab+0x121/0x190 [ 2165.198177][T27338] should_failslab+0x9/0x14 [ 2165.202707][T27338] __kmalloc+0x2dc/0x740 [ 2165.206979][T27338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2165.213261][T27338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2165.219531][T27338] ? tls_get_rec+0x104/0x590 [ 2165.224243][T27338] tls_get_rec+0x104/0x590 [ 2165.228684][T27338] tls_sw_sendmsg+0xda5/0x17b0 [ 2165.233497][T27338] ? tx_work_handler+0xf0/0xf0 [ 2165.238301][T27338] ? aa_sk_perm+0x288/0x880 [ 2165.242909][T27338] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2165.248478][T27338] inet_sendmsg+0x147/0x5e0 [ 2165.253026][T27338] ? ipip_gro_receive+0x100/0x100 [ 2165.258087][T27338] sock_sendmsg+0xf2/0x170 [ 2165.262535][T27338] __sys_sendto+0x262/0x380 [ 2165.267064][T27338] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2165.272457][T27338] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2165.278030][T27338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2165.284278][T27338] ? fput_many+0x12c/0x1a0 [ 2165.284291][T27338] ? fput+0x1b/0x20 [ 2165.284303][T27338] ? ksys_write+0x1cf/0x290 [ 2165.284322][T27338] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2165.284342][T27338] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2165.308205][T27338] ? do_syscall_64+0x26/0x680 [ 2165.312906][T27338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2165.318995][T27338] __x64_sys_sendto+0xe1/0x1a0 [ 2165.323783][T27338] do_syscall_64+0x103/0x680 [ 2165.328397][T27338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2165.334304][T27338] RIP: 0033:0x458da9 17:19:52 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xd, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:52 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x28, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:52 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x58, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2165.338214][T27338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2165.359978][T27338] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2165.368405][T27338] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2165.376477][T27338] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2165.384456][T27338] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2165.384466][T27338] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:19:52 executing program 1 (fault-call:9 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2165.384474][T27338] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='rdma.max\x00', 0x2, 0x0) pread64(r2, 0x0, 0x0, 0x0) [ 2165.548759][T27356] FAULT_INJECTION: forcing a failure. [ 2165.548759][T27356] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2165.588081][T27356] CPU: 1 PID: 27356 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2165.595681][T27356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2165.605745][T27356] Call Trace: [ 2165.609050][T27356] dump_stack+0x172/0x1f0 [ 2165.613401][T27356] should_fail.cold+0xa/0x15 [ 2165.618006][T27356] ? __sys_sendto+0x262/0x380 [ 2165.622705][T27356] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2165.628640][T27356] should_fail_alloc_page+0x50/0x60 [ 2165.633871][T27356] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2165.639268][T27356] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2165.644925][T27356] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2165.650662][T27356] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2165.656326][T27356] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2165.662607][T27356] alloc_pages_current+0x107/0x210 [ 2165.667745][T27356] skb_page_frag_refill+0x277/0x460 [ 2165.672962][T27356] sk_page_frag_refill+0x55/0x1f0 [ 2165.678016][T27356] sk_msg_alloc+0x10e/0x8d0 [ 2165.682553][T27356] tls_sw_sendmsg+0x63c/0x17b0 [ 2165.687400][T27356] ? tx_work_handler+0xf0/0xf0 [ 2165.692194][T27356] ? aa_sk_perm+0x288/0x880 [ 2165.696737][T27356] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2165.702313][T27356] inet_sendmsg+0x147/0x5e0 [ 2165.706841][T27356] ? ipip_gro_receive+0x100/0x100 [ 2165.711892][T27356] sock_sendmsg+0xf2/0x170 [ 2165.716338][T27356] __sys_sendto+0x262/0x380 [ 2165.720865][T27356] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2165.726261][T27356] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2165.731838][T27356] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2165.738089][T27356] ? fput_many+0x12c/0x1a0 [ 2165.742530][T27356] ? fput+0x1b/0x20 [ 2165.746351][T27356] ? ksys_write+0x1cf/0x290 [ 2165.750883][T27356] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2165.756361][T27356] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2165.761942][T27356] ? do_syscall_64+0x26/0x680 [ 2165.766643][T27356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2165.772735][T27356] __x64_sys_sendto+0xe1/0x1a0 [ 2165.778145][T27356] do_syscall_64+0x103/0x680 [ 2165.782937][T27356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2165.788842][T27356] RIP: 0033:0x458da9 [ 2165.792747][T27356] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2165.812453][T27356] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2165.820968][T27356] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2165.828962][T27356] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2165.836945][T27356] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:19:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt(r0, 0x80, 0x3d, &(0x7f0000007400)="e308a832efcc2a234c8c7122ac96d8b745e4eac3d48e4954a1a3516f0754e6f7aceeb996e153b413e01868479b12c296f2d432e1ebef9672829383eac9df4596d3d125018cac58dc", 0x48) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000e, &(0x7f00001c9fff)="03", 0x1) recvmmsg(r1, &(0x7f00000071c0)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/65, 0x41}], 0x1, &(0x7f0000000140)=""/213, 0xd5}, 0x5}, {{&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/116, 0x74}, {&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f00000003c0)=""/9, 0x9}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/67, 0x43}], 0x5, &(0x7f0000000580)=""/80, 0x50}, 0x7}, {{&(0x7f0000000600)=@hci, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000680)=""/35, 0x23}], 0x1, &(0x7f0000000700)=""/60, 0x3c}, 0x9}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000007c0)=""/82, 0x52}, {&(0x7f0000000840)=""/26, 0x1a}, {&(0x7f0000000880)=""/135, 0x87}, {&(0x7f0000000940)=""/120, 0x78}, {&(0x7f00000009c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001a40)=""/107, 0x6b}, 0x8}, {{&(0x7f0000001ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/220, 0xdc}, {&(0x7f0000001c40)=""/254, 0xfe}, {&(0x7f0000001d40)=""/34, 0x22}, {&(0x7f0000001d80)=""/12, 0xc}, {&(0x7f0000001dc0)=""/86, 0x56}, {&(0x7f0000001e40)=""/20, 0x14}, {&(0x7f0000001e80)=""/125, 0x7d}], 0x7, &(0x7f0000001f80)=""/212, 0xd4}, 0x6}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000002080)=""/52, 0x34}, {&(0x7f00000020c0)=""/120, 0x78}, {&(0x7f0000002140)=""/82, 0x52}, {&(0x7f00000021c0)=""/240, 0xf0}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/168, 0xa8}, {&(0x7f0000003380)=""/161, 0xa1}, {&(0x7f0000003440)=""/233, 0xe9}], 0x8}, 0x8}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f00000035c0)=""/79, 0x4f}, {&(0x7f0000003640)=""/68, 0x44}, {&(0x7f00000036c0)=""/99, 0x63}, {&(0x7f0000003740)=""/73, 0x49}, {&(0x7f00000037c0)=""/50, 0x32}, {&(0x7f0000003800)=""/119, 0x77}, {&(0x7f0000003880)=""/167, 0xa7}, {&(0x7f0000003940)=""/25, 0x19}, {&(0x7f0000003980)=""/98, 0x62}, {&(0x7f0000003a00)=""/95, 0x5f}], 0xa, &(0x7f0000003b40)=""/86, 0x56}, 0x2}, {{&(0x7f0000003bc0)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000007000)=[{&(0x7f0000003c40)=""/4096, 0x1000}, {&(0x7f0000004c40)=""/109, 0x6d}, {&(0x7f0000004cc0)=""/4096, 0x1000}, {&(0x7f0000005cc0)=""/4096, 0x1000}, {&(0x7f0000006cc0)=""/250, 0xfa}, {&(0x7f0000006dc0)=""/93, 0x5d}, {&(0x7f0000006e40)=""/46, 0x2e}, {&(0x7f0000006e80)=""/94, 0x5e}, {&(0x7f0000006f00)=""/144, 0x90}, {&(0x7f0000006fc0)=""/9, 0x9}], 0xa, &(0x7f00000070c0)=""/208, 0xd0}, 0xcb9}], 0x8, 0x12000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000073c0)={r1, r1}) [ 2165.844926][T27356] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2165.852905][T27356] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="890200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:53 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xf0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:53 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}, 0x8000}, 0x5c) r1 = socket(0x11, 0x4000000000080002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x7, @loopback, 0x5}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e20, 0x0, @local, 0xfffffffffffffe00}, @in6={0xa, 0x4e20, 0x2, @rand_addr="deaedb689637a55bf35479cf79296702"}], 0x74) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000000)={'ip6_vti\xb0\x00\x10\x00\x00\x00\x00\x00z'}) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0x6, 0x7}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 17:19:53 executing program 1 (fault-call:9 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:53 executing program 4: unshare(0x4a0001ff) unshare(0x28020400) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f00000000c0)={0xfffffffffffffffb, {{0xa, 0x400004e24, 0x5ce, @local, 0x6}}}, 0x88) 17:19:53 executing program 2: r0 = socket(0x1, 0x3, 0x800) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000040)={0x4009, 0xb, 0x2, 0x2003}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) [ 2166.376262][T27383] IPVS: ftp: loaded support on port[0] = 21 [ 2166.429335][T27387] FAULT_INJECTION: forcing a failure. [ 2166.429335][T27387] name failslab, interval 1, probability 0, space 0, times 0 [ 2166.459641][T27387] CPU: 1 PID: 27387 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2166.467227][T27387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2166.467235][T27387] Call Trace: [ 2166.467262][T27387] dump_stack+0x172/0x1f0 [ 2166.467291][T27387] should_fail.cold+0xa/0x15 [ 2166.485557][T27387] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2166.495953][T27387] ? ___might_sleep+0x163/0x280 [ 2166.495972][T27387] __should_failslab+0x121/0x190 [ 2166.495986][T27387] should_failslab+0x9/0x14 [ 2166.496001][T27387] __kmalloc+0x2dc/0x740 [ 2166.496017][T27387] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2166.496038][T27387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2166.527105][T27387] ? tls_get_rec+0x104/0x590 [ 2166.531733][T27387] tls_get_rec+0x104/0x590 [ 2166.536174][T27387] tls_sw_sendmsg+0xda5/0x17b0 [ 2166.540973][T27387] ? tx_work_handler+0xf0/0xf0 [ 2166.545762][T27387] ? aa_sk_perm+0x288/0x880 [ 2166.545787][T27387] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2166.545817][T27387] inet_sendmsg+0x147/0x5e0 [ 2166.560362][T27387] ? ipip_gro_receive+0x100/0x100 [ 2166.565406][T27387] sock_sendmsg+0xf2/0x170 [ 2166.565428][T27387] __sys_sendto+0x262/0x380 [ 2166.565447][T27387] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2166.565468][T27387] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2166.585381][T27387] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2166.591637][T27387] ? fput_many+0x12c/0x1a0 [ 2166.591654][T27387] ? fput+0x1b/0x20 [ 2166.591667][T27387] ? ksys_write+0x1cf/0x290 [ 2166.591687][T27387] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.591708][T27387] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.615328][T27387] ? do_syscall_64+0x26/0x680 [ 2166.615348][T27387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2166.615371][T27387] __x64_sys_sendto+0xe1/0x1a0 [ 2166.615391][T27387] do_syscall_64+0x103/0x680 [ 2166.615411][T27387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2166.615429][T27387] RIP: 0033:0x458da9 [ 2166.635697][T27387] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2166.635707][T27387] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 17:19:53 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x300, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:53 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x500, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2166.635722][T27387] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2166.635731][T27387] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2166.635748][T27387] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2166.665159][T27387] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2166.665169][T27387] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x543, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2166.842343][ C1] net_ratelimit: 4 callbacks suppressed [ 2166.842351][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.842391][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.847988][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.848081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.853949][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.859565][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.865330][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:19:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x600, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:54 executing program 1 (fault-call:9 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2167.038636][T27383] IPVS: ftp: loaded support on port[0] = 21 17:19:54 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x608, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2167.130934][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2167.148426][T27410] FAULT_INJECTION: forcing a failure. [ 2167.148426][T27410] name failslab, interval 1, probability 0, space 0, times 0 [ 2167.196414][T27410] CPU: 0 PID: 27410 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2167.204011][T27410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2167.204019][T27410] Call Trace: [ 2167.204046][T27410] dump_stack+0x172/0x1f0 [ 2167.204071][T27410] should_fail.cold+0xa/0x15 [ 2167.204091][T27410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2167.204116][T27410] ? ___might_sleep+0x163/0x280 [ 2167.204140][T27410] __should_failslab+0x121/0x190 [ 2167.204156][T27410] should_failslab+0x9/0x14 [ 2167.204175][T27410] kmem_cache_alloc_node+0x264/0x710 [ 2167.204203][T27410] __alloc_skb+0xd5/0x5e0 [ 2167.204224][T27410] ? skb_trim+0x190/0x190 [ 2167.204240][T27410] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2167.204253][T27410] ? tcp_enter_memory_pressure+0x130/0x130 [ 2167.204271][T27410] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2167.204294][T27410] sk_stream_alloc_skb+0x326/0xd80 [ 2167.204316][T27410] do_tcp_sendpages+0xafa/0x1b70 [ 2167.204351][T27410] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2167.266385][T27410] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2167.266405][T27410] tls_push_sg+0x1de/0x680 [ 2167.266429][T27410] tls_tx_records+0x3c8/0x760 [ 2167.266451][T27410] tls_push_record+0x1f67/0x3580 [ 2167.266479][T27410] ? tls_tx_records+0x760/0x760 [ 2167.266501][T27410] ? lock_downgrade+0x880/0x880 [ 2167.283235][T27410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2167.283255][T27410] ? kasan_check_read+0x11/0x20 [ 2167.283277][T27410] bpf_exec_tx_verdict+0xe30/0x1280 [ 2167.283300][T27410] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2167.283314][T27410] ? tls_push_record+0x3580/0x3580 [ 2167.283391][T27410] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2167.293660][T27410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2167.293677][T27410] ? sk_msg_alloc+0x62d/0x8d0 [ 2167.293702][T27410] tls_sw_sendmsg+0x107c/0x17b0 [ 2167.293733][T27410] ? tx_work_handler+0xf0/0xf0 [ 2167.293749][T27410] ? aa_sk_perm+0x288/0x880 [ 2167.293770][T27410] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2167.303913][T27410] inet_sendmsg+0x147/0x5e0 [ 2167.303929][T27410] ? ipip_gro_receive+0x100/0x100 [ 2167.303947][T27410] sock_sendmsg+0xf2/0x170 [ 2167.303964][T27410] __sys_sendto+0x262/0x380 [ 2167.303982][T27410] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2167.304000][T27410] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2167.304034][T27410] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2167.313655][T27410] ? fput_many+0x12c/0x1a0 [ 2167.313669][T27410] ? fput+0x1b/0x20 [ 2167.313681][T27410] ? ksys_write+0x1cf/0x290 [ 2167.313699][T27410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2167.313713][T27410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2167.313727][T27410] ? do_syscall_64+0x26/0x680 [ 2167.313744][T27410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2167.313767][T27410] __x64_sys_sendto+0xe1/0x1a0 [ 2167.323484][T27410] do_syscall_64+0x103/0x680 [ 2167.323508][T27410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2167.323519][T27410] RIP: 0033:0x458da9 [ 2167.323534][T27410] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2167.323542][T27410] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2167.323555][T27410] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2167.323562][T27410] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2167.323570][T27410] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2167.323578][T27410] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2167.323586][T27410] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="8a0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:55 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x689, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="4117a9c5000000008400000001000000000000000000000000000000000000000000000000003f24028f598fa7451b056861b8deebc51555adf964cca9000afa14266b6e80e80b888da4fd20c0501d69002f4657b509e6ecbd2a205ac69637affa075b9081a1f706307d3a4df04f9c1d18c280f5d25cb1f932ce01869157bc16c70d27dbccf52983ecd3de4b578d7d8627292e8fc07a2f71beaae596c0ebd491b27f19e1a6ca0628bc8108e5bb41375207bcdae4db9fed365ea0f7f87fe4b9be142c75eea95999e542075e4a8aa60000003e0cf724ebce64", @ANYRES32=0x0], 0x30}], 0x1, 0x0) 17:19:56 executing program 1 (fault-call:9 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x700, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000600)=""/158, 0xfffffffffffffdd0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f00000000c0)={'veth1_to_bridge\x00', 0x400}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x200, 0x8000}) connect$bt_sco(r1, &(0x7f0000000140)={0x1f, {0xa23f, 0x81, 0x77, 0x71, 0x6, 0xfffffffffffffffe}}, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb080045ff7f000000000000019078ac2314b8ac1414000305907800000000450000000040ffec00040000ac2314aaac141400"], 0x0) unshare(0x40000000) r3 = accept(r0, &(0x7f0000001a40)=@hci, &(0x7f0000001ac0)=0x80) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001bc0)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x8000040}, 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)={0x1c, r2, 0x400, 0x70bd28, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x1) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x15b) r4 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x8, 0x7}, 0x8) r5 = socket$nl_generic(0xa, 0x5, 0x84) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test}) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="05925b4000b2db15aa39a5cad6cc8cf2404c19be5e251704030eae42562bf0e740e36372000000000000d6beac585106cd3d3903bbac9559cdea28cdd6cbdb4c916ea588a49140ffb724f4e204a46c9e9d2f87a8ec06cbf2b02bafc6e700761ce1829023619fc069d2843aa046c71ccc253e30d0be24b937a0e222838f036f0acff7a12155bfe1179d5c220fcf350e7e524ef8cab083aaeb7b605f55fc4f2eb02e7ff30640c8838409d7d0f76e4acd2966accf54b002429db1c9b7d2e697d0db1eca757b0b040d37bfce77f0163b8c321c8f5edb17c96875b946b590286309c0c1b5e1f6428756992330e6070efc60b938e6c9450e61b70e17f7bd4a70f1f00a22ffd53ee21a51fe77a42639b58ef8e529b7d6859526af7707708fcbfa14dcf7aaf6e71f80bdded5"]) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="040028bd7000fddbdf25091100000800050026875e2e"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40040) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 17:19:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="8b0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:19:56 executing program 4: r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x20813, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$caif_seqpacket(0x25, 0x5, 0x4) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x30c) syz_init_net_socket$llc(0x1a, 0x3, 0x0) [ 2169.385847][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2169.407809][T27441] FAULT_INJECTION: forcing a failure. [ 2169.407809][T27441] name failslab, interval 1, probability 0, space 0, times 0 [ 2169.428934][T27441] CPU: 0 PID: 27441 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2169.436520][T27441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2169.446602][T27441] Call Trace: [ 2169.449934][T27441] dump_stack+0x172/0x1f0 [ 2169.454303][T27441] should_fail.cold+0xa/0x15 [ 2169.458921][T27441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2169.464839][T27441] ? ___might_sleep+0x163/0x280 [ 2169.469754][T27441] __should_failslab+0x121/0x190 [ 2169.474714][T27441] should_failslab+0x9/0x14 [ 2169.480458][T27441] kmem_cache_alloc_node_trace+0x270/0x720 [ 2169.486305][T27441] __kmalloc_node_track_caller+0x3d/0x70 [ 2169.491961][T27441] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2169.497357][T27441] __alloc_skb+0x10b/0x5e0 [ 2169.501793][T27441] ? skb_trim+0x190/0x190 [ 2169.506142][T27441] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2169.511882][T27441] ? tcp_enter_memory_pressure+0x130/0x130 [ 2169.517708][T27441] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2169.523640][T27441] sk_stream_alloc_skb+0x326/0xd80 [ 2169.528779][T27441] do_tcp_sendpages+0xafa/0x1b70 17:19:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x806, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xd00, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2169.533749][T27441] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2169.539064][T27441] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2169.544797][T27441] tls_push_sg+0x1de/0x680 [ 2169.549230][T27441] tls_tx_records+0x3c8/0x760 [ 2169.549258][T27441] tls_push_record+0x1f67/0x3580 [ 2169.558892][T27441] ? tls_tx_records+0x760/0x760 [ 2169.563761][T27441] ? lock_downgrade+0x880/0x880 [ 2169.568642][T27441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2169.574893][T27441] ? kasan_check_read+0x11/0x20 [ 2169.574916][T27441] bpf_exec_tx_verdict+0xe30/0x1280 [ 2169.574938][T27441] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2169.574953][T27441] ? tls_push_record+0x3580/0x3580 [ 2169.575034][T27441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2169.575058][T27441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2169.590824][T27441] ? sk_msg_alloc+0x62d/0x8d0 [ 2169.613359][T27441] tls_sw_sendmsg+0x107c/0x17b0 [ 2169.618249][T27441] ? tx_work_handler+0xf0/0xf0 [ 2169.623036][T27441] ? aa_sk_perm+0x288/0x880 [ 2169.627574][T27441] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2169.633168][T27441] inet_sendmsg+0x147/0x5e0 [ 2169.637718][T27441] ? ipip_gro_receive+0x100/0x100 [ 2169.642767][T27441] sock_sendmsg+0xf2/0x170 [ 2169.647203][T27441] __sys_sendto+0x262/0x380 [ 2169.651809][T27441] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2169.657204][T27441] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2169.663051][T27441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2169.669304][T27441] ? fput_many+0x12c/0x1a0 [ 2169.673742][T27441] ? fput+0x1b/0x20 [ 2169.677563][T27441] ? ksys_write+0x1cf/0x290 17:19:56 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xe80, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2169.682091][T27441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2169.687565][T27441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2169.693064][T27441] ? do_syscall_64+0x26/0x680 [ 2169.697759][T27441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2169.703847][T27441] __x64_sys_sendto+0xe1/0x1a0 [ 2169.708645][T27441] do_syscall_64+0x103/0x680 [ 2169.713256][T27441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2169.719155][T27441] RIP: 0033:0x458da9 [ 2169.723073][T27441] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2169.742696][T27441] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2169.751127][T27441] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2169.759124][T27441] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2169.767123][T27441] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2169.778328][T27441] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2169.786321][T27441] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:57 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x2800, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:57 executing program 1 (fault-call:9 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:19:57 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x6, 0x1, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 2169.930614][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2169.977720][T27462] FAULT_INJECTION: forcing a failure. [ 2169.977720][T27462] name failslab, interval 1, probability 0, space 0, times 0 [ 2170.050772][T27462] CPU: 1 PID: 27462 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2170.058373][T27462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2170.068458][T27462] Call Trace: [ 2170.071774][T27462] dump_stack+0x172/0x1f0 [ 2170.076151][T27462] should_fail.cold+0xa/0x15 [ 2170.080774][T27462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2170.086619][T27462] ? ___might_sleep+0x163/0x280 [ 2170.086893][T27452] IPVS: ftp: loaded support on port[0] = 21 [ 2170.091516][T27462] __should_failslab+0x121/0x190 [ 2170.091535][T27462] should_failslab+0x9/0x14 [ 2170.091551][T27462] __kmalloc+0x2dc/0x740 [ 2170.091568][T27462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2170.091602][T27462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2170.123764][T27462] ? tls_get_rec+0x104/0x590 [ 2170.128369][T27462] tls_get_rec+0x104/0x590 [ 2170.128390][T27462] tls_sw_sendmsg+0xda5/0x17b0 [ 2170.128424][T27462] ? tx_work_handler+0xf0/0xf0 [ 2170.128441][T27462] ? aa_sk_perm+0x288/0x880 [ 2170.128466][T27462] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2170.146896][T27462] inet_sendmsg+0x147/0x5e0 [ 2170.146913][T27462] ? ipip_gro_receive+0x100/0x100 [ 2170.146932][T27462] sock_sendmsg+0xf2/0x170 [ 2170.146956][T27462] __sys_sendto+0x262/0x380 [ 2170.166619][T27462] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2170.166642][T27462] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2170.166674][T27462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2170.166693][T27462] ? fput_many+0x12c/0x1a0 [ 2170.176567][T27462] ? fput+0x1b/0x20 [ 2170.176582][T27462] ? ksys_write+0x1cf/0x290 [ 2170.176612][T27462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2170.176627][T27462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2170.176650][T27462] ? do_syscall_64+0x26/0x680 [ 2170.192847][T27462] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2170.192872][T27462] __x64_sys_sendto+0xe1/0x1a0 [ 2170.192895][T27462] do_syscall_64+0x103/0x680 [ 2170.192916][T27462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2170.192928][T27462] RIP: 0033:0x458da9 [ 2170.192948][T27462] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2170.203101][T27462] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2170.203123][T27462] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2170.203132][T27462] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 17:19:57 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x3580, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:19:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x8d, "8d5539c212f48e41d7fdf17967dd291e3134f3781a71315e029272b04d88255097f4cd07b4dcadcb1373637f1cf0867d444773fa8d4ce2f6e15c6eeed4746eebb80306580eb9bfc00adf28c0197224534118306b6018101b70b722dc10d4dab6f48fdac23f3bb20188871a0b50c725f38f9f630cc0d831e5d33fc32f7e9aa684a74d5b6f87219a70ddb743ee7c"}, &(0x7f0000000140)=0x95) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0xfff, 0x6, 0x4, 0x3, 0xd8, 0x8000, 0x2, 0x1, r1}, 0x20) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 2170.203141][T27462] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2170.203150][T27462] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2170.203158][T27462] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:19:57 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x3f00, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2170.621428][T27472] IPVS: ftp: loaded support on port[0] = 21 17:20:00 executing program 2: bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002e80)=[{{&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000000500)=[{&(0x7f0000000240)=""/216, 0xd8}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/104, 0x68}, {&(0x7f0000000400)=""/211, 0xd3}], 0x4, &(0x7f0000000540)=""/104, 0x68}, 0x3f}, {{&(0x7f00000005c0)=@ipx, 0x80, &(0x7f0000000940)=[{&(0x7f0000000640)=""/69, 0x45}, {&(0x7f00000006c0)=""/195, 0xc3}, {&(0x7f00000007c0)=""/217, 0xd9}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x4, &(0x7f0000000980)=""/34, 0x22}, 0x80000000}, {{&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/39, 0x27}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/159, 0x9f}, {&(0x7f0000002b40)=""/148, 0x94}, {&(0x7f0000002c00)=""/232, 0xe8}, {&(0x7f0000002d00)=""/6, 0x6}], 0x7, &(0x7f0000002dc0)=""/167, 0xa7}, 0x6}], 0x3, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000002f40)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x9, 0xffffffffa117b713}, &(0x7f0000003000)=0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000003040)={r2, 0x5, 0x8}, &(0x7f0000003080)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000030c0)={{0x2, 0x4e24, @rand_addr=0x3ff}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x70, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'syzkaller1\x00'}) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffeb8, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000080)="138f41ce9ecf11c4d2fafbe91629294c", 0x10) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000340)={0x7, 0x3, 0x0, 0x80000001, 0x7, 0x52, 0x3}, 0xc) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) accept(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x0) 17:20:00 executing program 1 (fault-call:9 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:00 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001980)={0x0, @in6={{0xa, 0x4e21, 0x2f8, @rand_addr="a629e7b00f8e38a66f88f0ccecdd6b6e", 0x8b00000000000000}}, 0x1ed0, 0x7, 0x2, 0x4823, 0x80}, &(0x7f00000003c0)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000001a40)={r2, 0x8}, 0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x800448d2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x401, 0x10}, &(0x7f00000004c0)=0xc) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f00000008c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x13c, r7, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff00000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffffff}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x8800}, 0x20000010) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000500)=@assoc_value={r6}, &(0x7f0000000540)=0x8) sendmsg$nl_generic(r4, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="1e0cf9f2c3c424715a062288058310c89bbd48a3c0e32029e2bdc7bb1b270c001a0074727573746564000000"], 0x20c}}, 0x8004) 17:20:00 executing program 5: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x3, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x11, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f0c3c123f319bd070") write(r1, &(0x7f0000000040)='$', 0x1) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) 17:20:00 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="8c0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:00 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4305, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2173.291464][ C1] net_ratelimit: 4 callbacks suppressed [ 2173.291476][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:20:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x12, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x54}}, &(0x7f0000000240)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8}, 0x23e) clock_gettime(0x0, &(0x7f0000002640)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000024c0)=[{{&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)=""/109, 0x6d}, {&(0x7f0000000280)=""/192, 0xc0}, {&(0x7f0000000340)=""/238, 0xee}, {&(0x7f0000000440)=""/10, 0xa}], 0x4}, 0xb2}, {{&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000580)=""/250, 0xfa}, 0x3}, {{&(0x7f0000000680)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000700)=""/229, 0xe5}, {&(0x7f0000000800)=""/115, 0x73}, {&(0x7f0000000880)=""/233, 0xe9}], 0x3, &(0x7f00000009c0)=""/114, 0x72}, 0xd2e5}, {{&(0x7f0000000a40)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)=""/77, 0x4d}, {&(0x7f0000000b40)=""/165, 0xa5}], 0x2, &(0x7f0000000c40)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001c40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001cc0)=""/149, 0x95}, {&(0x7f0000001d80)=""/90, 0x5a}, {&(0x7f0000001e00)}], 0x3, &(0x7f0000001e80)=""/72, 0x48}, 0x3}, {{&(0x7f0000001f00)=@nfc_llcp, 0x80, &(0x7f0000002380)=[{&(0x7f0000001f80)=""/133, 0x85}, {&(0x7f0000002040)=""/146, 0x92}, {&(0x7f0000002100)=""/21, 0x15}, {&(0x7f0000002140)=""/18, 0x12}, {&(0x7f0000002180)=""/148, 0x94}, {&(0x7f0000002240)=""/230, 0xe6}, {&(0x7f0000002340)=""/41, 0x29}], 0x7, &(0x7f0000002400)=""/143, 0x8f}, 0x6}], 0x6, 0x40000022, &(0x7f0000002680)={r1, r2+10000000}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000002940)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001e00)=0x3e2) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000002880)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x44000021}, 0xc, &(0x7f0000002840)={&(0x7f00000028c0)=ANY=[@ANYBLOB="000000005a14ba086b87cbbd2f7822f52c3fbdd0", @ANYRES16=0x0, @ANYBLOB="000027bd7000fedbdf2502000000080001004e22000008000a004e23000008000a004e20000008000b00", @ANYRES32=r4], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x10) 17:20:00 executing program 5: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x68b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[]]}, 0x178) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="006d656d6f7279207b0ba50a1fc8a82e3e78014756a9935290e1edadb57305f532568b8895656ee5a423a0af0ed20284ce9658a3deda66390e7b7326b1f0a601fea564e2ca4611e2fb41985ea690890ca48def"], 0x200600) [ 2173.358322][T27503] FAULT_INJECTION: forcing a failure. [ 2173.358322][T27503] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2173.426999][T27503] CPU: 1 PID: 27503 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2173.434590][T27503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2173.434608][T27503] Call Trace: [ 2173.434635][T27503] dump_stack+0x172/0x1f0 [ 2173.434660][T27503] should_fail.cold+0xa/0x15 [ 2173.434680][T27503] ? __sys_sendto+0x262/0x380 [ 2173.434702][T27503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2173.467450][T27503] should_fail_alloc_page+0x50/0x60 [ 2173.472668][T27503] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2173.478056][T27503] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2173.484704][T27503] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2173.484720][T27503] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2173.484745][T27503] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2173.502321][T27503] alloc_pages_current+0x107/0x210 [ 2173.507450][T27503] skb_page_frag_refill+0x277/0x460 [ 2173.512665][T27503] sk_page_frag_refill+0x55/0x1f0 [ 2173.512685][T27503] sk_msg_alloc+0x10e/0x8d0 [ 2173.512711][T27503] tls_sw_sendmsg+0x63c/0x17b0 [ 2173.512749][T27503] ? tx_work_handler+0xf0/0xf0 [ 2173.527113][T27503] ? aa_sk_perm+0x288/0x880 [ 2173.527145][T27503] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2173.541959][T27503] inet_sendmsg+0x147/0x5e0 [ 2173.546475][T27503] ? ipip_gro_receive+0x100/0x100 [ 2173.551520][T27503] sock_sendmsg+0xf2/0x170 [ 2173.555954][T27503] __sys_sendto+0x262/0x380 [ 2173.560474][T27503] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2173.565862][T27503] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2173.571443][T27503] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 17:20:00 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4788, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2173.577690][T27503] ? fput_many+0x12c/0x1a0 [ 2173.582137][T27503] ? fput+0x1b/0x20 [ 2173.585962][T27503] ? ksys_write+0x1cf/0x290 [ 2173.590481][T27503] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.595950][T27503] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.601604][T27503] ? do_syscall_64+0x26/0x680 [ 2173.606303][T27503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.612401][T27503] __x64_sys_sendto+0xe1/0x1a0 [ 2173.617184][T27503] do_syscall_64+0x103/0x680 [ 2173.621793][T27503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.627703][T27503] RIP: 0033:0x458da9 [ 2173.631614][T27503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2173.651238][T27503] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2173.651253][T27503] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2173.651260][T27503] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2173.651267][T27503] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2173.651275][T27503] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2173.651283][T27503] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:01 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4888, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:01 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="4c0000001200ff095ffefd956fa283b724a6008400000500000000683540150024001d001fc41180b598bc593ab6821148a730de33a4985d0f1cbc882b079881f72ee9cc5848af5ec85e0000", 0x4c}], 0x1}, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x2, 0x250, 0x3, 0xfffffffffffffffc, 0xba1d, 0x8, 0x7fff, {0x0, @in={{0x2, 0x4e23, @loopback}}, 0x7, 0x8, 0xffffffff, 0x6, 0x9}}, &(0x7f00000003c0)=0xb0) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000180)=@in={0x2, 0x4e24, @empty}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000001c0)="6e0c57288250ded10ff421223ba48aad12d704c87b6048225e771a779ef6a53d15c76b8920ead345f302f91b1585de8d4b91bce53f8134d7e3008bd06a89b6606205d10bdf4dc98466866f6994cd471fb15eee3606494462a0045be7602c5361073f55d505f7b475238a1ba1bc8430cf164c008ce9c51c456c89379eca7cfad899b6a99a66854f3966d9230ec1322b3b45d1aac39477bb9bc1763a3b46c9ccb875a17f077b4fe6096124c68ed88798997a66846a1c804ad5e8085cf0ef883f9193e2", 0xc2}], 0x1, &(0x7f0000000400)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x8, 0x200, 0x9c, 0x2, 0x8, 0x80000001, 0x80000001, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @authinfo={0x18, 0x84, 0x6, {0x81}}, @init={0x18, 0x84, 0x0, {0x100000001, 0x3, 0x1f, 0x3}}, @authinfo={0x18, 0x84, 0x6, {0x4}}], 0x98, 0x8050}, 0x20008000) r2 = socket$xdp(0x2c, 0x3, 0x0) listen(r2, 0x4) 17:20:01 executing program 2: r0 = socket(0x1e, 0x801, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:20:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$kcm(0x2, 0x2, 0x73) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x9, 0x4) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @broadcast}, 0x10) connect(r1, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @empty}, &(0x7f0000000180)=0xc) sendmmsg(r1, &(0x7f0000001540), 0x24c, 0x0) 17:20:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x2, "f103f51cc4885c81"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x400000000000003a, 0x1, &(0x7f0000261f44)=""/188, &(0x7f0000000040)=0x240) 17:20:01 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x5800, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:01 executing program 1 (fault-call:9 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2174.127072][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2174.164929][T27545] FAULT_INJECTION: forcing a failure. [ 2174.164929][T27545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2174.204993][T27545] CPU: 1 PID: 27545 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2174.212625][T27545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2174.212634][T27545] Call Trace: [ 2174.212661][T27545] dump_stack+0x172/0x1f0 [ 2174.212687][T27545] should_fail.cold+0xa/0x15 [ 2174.212707][T27545] ? __sys_sendto+0x262/0x380 [ 2174.212728][T27545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2174.212745][T27545] ? mark_held_locks+0xf0/0xf0 [ 2174.212773][T27545] should_fail_alloc_page+0x50/0x60 [ 2174.235169][T27545] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2174.261694][T27545] ? cache_grow_end+0xa4/0x190 [ 2174.266600][T27545] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2174.272330][T27545] ? kasan_check_write+0x14/0x20 [ 2174.277385][T27545] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2174.283674][T27545] alloc_pages_current+0x107/0x210 [ 2174.288805][T27545] skb_page_frag_refill+0x277/0x460 [ 2174.294030][T27545] sk_page_frag_refill+0x55/0x1f0 [ 2174.299083][T27545] sk_msg_alloc+0x10e/0x8d0 [ 2174.303708][T27545] tls_sw_sendmsg+0x63c/0x17b0 [ 2174.308867][T27545] ? tx_work_handler+0xf0/0xf0 [ 2174.313650][T27545] ? aa_sk_perm+0x288/0x880 [ 2174.318177][T27545] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2174.323754][T27545] inet_sendmsg+0x147/0x5e0 [ 2174.328269][T27545] ? ipip_gro_receive+0x100/0x100 [ 2174.333317][T27545] sock_sendmsg+0xf2/0x170 [ 2174.337845][T27545] __sys_sendto+0x262/0x380 [ 2174.342371][T27545] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2174.347763][T27545] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2174.353326][T27545] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2174.353339][T27545] ? fput_many+0x12c/0x1a0 [ 2174.353352][T27545] ? fput+0x1b/0x20 [ 2174.353364][T27545] ? ksys_write+0x1cf/0x290 [ 2174.353381][T27545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2174.353395][T27545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2174.353415][T27545] ? do_syscall_64+0x26/0x680 [ 2174.378218][T27545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.378251][T27545] __x64_sys_sendto+0xe1/0x1a0 [ 2174.394448][T27545] do_syscall_64+0x103/0x680 [ 2174.394470][T27545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.394482][T27545] RIP: 0033:0x458da9 [ 2174.394497][T27545] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2174.394504][T27545] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2174.394518][T27545] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2174.394527][T27545] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2174.394535][T27545] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2174.394542][T27545] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2174.394550][T27545] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="8d0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:02 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x6488, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='\\+#$posix_acl_access\x00', r2}, 0x10) setsockopt$inet_msfilter(r1, 0x0, 0x31, 0x0, 0x0) 17:20:02 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x1000, @mcast2, 0x9}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) 17:20:02 executing program 1 (fault-call:9 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:02 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0)={0x1f, 0x3, 0x0, 0x344000000000}, 0x6) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, {0x4, 0x0, @multicast1}}) accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) 17:20:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000100)="6f1cc20a0c8b6da938d61624bd83d62a7170695fbb7fb6a1d10773caa4e13bc4d990be21531972e644a5147341bbe145ae700e87d3516fbed277e528fe2d") ioctl(r1, 0x20001000008912, &(0x7f0000000040)) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) 17:20:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'batadv0\x00'}) recvmsg(r0, &(0x7f0000001ac0)={&(0x7f0000000780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000800)=""/216, 0xd8}, {&(0x7f0000000900)=""/216, 0xd8}, {&(0x7f0000000a00)=""/4096, 0x1000}], 0x3, &(0x7f0000001a40)=""/110, 0x6e}, 0x42) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000001b00)=0x60, 0x2) 17:20:02 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x800e, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2174.861870][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2174.878263][T27569] FAULT_INJECTION: forcing a failure. [ 2174.878263][T27569] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2174.987651][T27569] CPU: 1 PID: 27569 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2174.995430][T27569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2175.005507][T27569] Call Trace: [ 2175.008835][T27569] dump_stack+0x172/0x1f0 [ 2175.013398][T27569] should_fail.cold+0xa/0x15 [ 2175.018009][T27569] ? __sys_sendto+0x262/0x380 [ 2175.022819][T27569] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2175.028740][T27569] should_fail_alloc_page+0x50/0x60 [ 2175.033950][T27569] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2175.039334][T27569] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2175.045012][T27569] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2175.050741][T27569] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2175.056392][T27569] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2175.056411][T27569] alloc_pages_current+0x107/0x210 [ 2175.056430][T27569] skb_page_frag_refill+0x277/0x460 [ 2175.056447][T27569] sk_page_frag_refill+0x55/0x1f0 [ 2175.056463][T27569] sk_msg_alloc+0x10e/0x8d0 [ 2175.056488][T27569] tls_sw_sendmsg+0x63c/0x17b0 [ 2175.056517][T27569] ? tx_work_handler+0xf0/0xf0 [ 2175.092178][T27569] ? aa_sk_perm+0x288/0x880 [ 2175.096809][T27569] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2175.102377][T27569] inet_sendmsg+0x147/0x5e0 [ 2175.106933][T27569] ? ipip_gro_receive+0x100/0x100 [ 2175.111974][T27569] sock_sendmsg+0xf2/0x170 [ 2175.116493][T27569] __sys_sendto+0x262/0x380 [ 2175.121016][T27569] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2175.123130][T27585] IPVS: ftp: loaded support on port[0] = 21 [ 2175.126413][T27569] ? __mutex_unlock_slowpath+0xf8/0x6b0 17:20:02 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8035, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2175.126445][T27569] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2175.126465][T27569] ? fput_many+0x12c/0x1a0 [ 2175.148825][T27569] ? fput+0x1b/0x20 [ 2175.152682][T27569] ? ksys_write+0x1cf/0x290 [ 2175.157212][T27569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2175.162688][T27569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2175.168174][T27569] ? do_syscall_64+0x26/0x680 [ 2175.172869][T27569] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2175.178956][T27569] __x64_sys_sendto+0xe1/0x1a0 [ 2175.183744][T27569] do_syscall_64+0x103/0x680 [ 2175.188353][T27569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2175.194264][T27569] RIP: 0033:0x458da9 [ 2175.198170][T27569] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2175.218146][T27569] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2175.226578][T27569] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2175.234666][T27569] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2175.242655][T27569] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2175.250646][T27569] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2175.258726][T27569] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2175.267383][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2175.273223][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2175.279083][ C1] protocol 88fb is buggy, dev hsr_slave_0 17:20:02 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) ioctl(r0, 0x10001, &(0x7f0000000340)="66c06623cb643338341fce0271c93ba99b34b63186e91209ed956fa16345e9aecf6ac9347741b10fd1a31631d3b55386afa4f08b2138b257ca8119e9f94b333edb8e658c95c39bf0c0bf4416342c0e801cb2eedabb8721e12531190642e64354b7d479ba6e0e6a062e3f933819f5f7e062246766ae607af47531b96e49e9ac99d05dab244403d407c06f82d3fcde4755bf5a370f1fed41d9c5a24675875164dcb83826c466ae9d73ed871835d8bbd83a8ec7e70ec825869b8ea7a315256d21828ab206d450ada31139564a94440826df6eba07fc67451acdd98ed38123991d884fbd6828f5d92b") getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) getsockopt$inet6_int(r4, 0x29, 0xdf, &(0x7f0000000100), &(0x7f0000000140)=0x4) read(r1, &(0x7f0000000280)=""/131, 0x83) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000240)={0x40, 0x4, 0x2}, 0x10) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) [ 2175.284939][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:20:02 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8100, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2175.809206][T27580] IPVS: ftp: loaded support on port[0] = 21 17:20:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="8e0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:03 executing program 1 (fault-call:9 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:03 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x29c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14, 0x0, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3201]}}}}}}}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) read(r0, &(0x7f0000000000)=""/81, 0x51) 17:20:03 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8847, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x20000000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1, 0x0, 0x0, 0x1f}, {0x80000006}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) r3 = accept(r1, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x80) getsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000300), &(0x7f0000000340)=0x4) sendmmsg(r2, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 17:20:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x7, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000003d80)) recvmmsg(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000001100)=[{&(0x7f0000003fc0)=""/4096, 0x1000}, {&(0x7f0000001080)=""/78, 0x4e}], 0x2, &(0x7f0000001140)=""/78, 0x4e}, 0x8}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000011c0)=""/202, 0xca}, {&(0x7f0000002f80)=""/32, 0x20}, {&(0x7f0000001300)=""/219, 0xdb}, {&(0x7f0000001400)=""/165, 0xa5}], 0x4, &(0x7f0000001500)=""/54, 0x36}, 0x5}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001540)=""/108, 0x6c}, {&(0x7f00000015c0)=""/195, 0xc3}, {&(0x7f00000016c0)=""/227, 0xe3}, {&(0x7f00000017c0)=""/25, 0x19}, {&(0x7f0000001800)=""/201, 0xc9}], 0x5, &(0x7f0000001980)=""/247, 0xfffffffffffffea4}, 0xfffffffffffffc01}, {{&(0x7f0000001a80)=@sco, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001b00)=""/4, 0x4}, {&(0x7f0000001b40)=""/171, 0xab}], 0x2, &(0x7f0000001c40)=""/4096, 0x1000}, 0x400}, {{&(0x7f0000003f40)=@ax25={{0x3, @null}, [@remote, @null, @bcast, @default, @remote, @remote, @default, @default]}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002cc0)=""/232, 0xe8}, {&(0x7f0000002dc0)=""/131, 0x83}, {&(0x7f0000002e80)=""/203, 0xcb}, {&(0x7f0000002f80)}], 0x4, &(0x7f0000003000)=""/2, 0x2}, 0x9}, {{&(0x7f0000003040)=@ax25={{0x3, @default}, [@bcast, @null, @bcast, @null, @netrom, @netrom, @default, @rose]}, 0x80, &(0x7f00000030c0)}, 0x3a65}, {{&(0x7f0000003100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000003380)=[{&(0x7f0000003180)=""/134, 0x86}, {&(0x7f0000003240)=""/248, 0xf8}, {&(0x7f0000003340)=""/2, 0x2}], 0x3}, 0xffffffffffffffc9}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f00000033c0)=""/71, 0x47}, {&(0x7f0000003440)=""/71, 0x47}, {&(0x7f00000034c0)=""/236, 0xec}], 0x3}, 0x2}, {{&(0x7f0000003600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003680)=""/96, 0x60}, {&(0x7f0000003700)=""/116, 0x26}, {&(0x7f0000003780)=""/26, 0x1a}], 0x3, &(0x7f0000003800)=""/138, 0x8a}, 0xf8}, {{&(0x7f00000038c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003940)}, {&(0x7f0000003980)=""/4, 0x4}, {&(0x7f00000039c0)=""/93, 0x5d}], 0x3, &(0x7f0000003a80)=""/121, 0xfe06}, 0x40}], 0xa, 0x2000, &(0x7f0000003dc0)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000003e40)='TIPC\x00') getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000db73c6e4b0327b7982eb1c79430564821db5"], &(0x7f00000000c0)=0x21) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r3, 0x7}, 0x8) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000003f00)={&(0x7f0000003e00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000003ec0)={&(0x7f0000003e80)={0x1c, r2, 0x300, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x4) [ 2176.412530][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2176.442366][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2176.444225][T27611] FAULT_INJECTION: forcing a failure. [ 2176.444225][T27611] name failslab, interval 1, probability 0, space 0, times 0 17:20:03 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8848, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2176.448313][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2176.472354][T27611] CPU: 1 PID: 27611 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2176.480416][T27611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2176.490484][T27611] Call Trace: [ 2176.493883][T27611] dump_stack+0x172/0x1f0 [ 2176.498221][T27611] should_fail.cold+0xa/0x15 [ 2176.502819][T27611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2176.508640][T27611] ? ___might_sleep+0x163/0x280 [ 2176.513500][T27611] __should_failslab+0x121/0x190 [ 2176.518447][T27611] should_failslab+0x9/0x14 [ 2176.522956][T27611] __kmalloc+0x2dc/0x740 [ 2176.527209][T27611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2176.533547][T27611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2176.539792][T27611] ? tls_get_rec+0x104/0x590 [ 2176.544394][T27611] tls_get_rec+0x104/0x590 [ 2176.548815][T27611] tls_sw_sendmsg+0xda5/0x17b0 [ 2176.553606][T27611] ? tx_work_handler+0xf0/0xf0 [ 2176.558369][T27611] ? aa_sk_perm+0x288/0x880 [ 2176.562879][T27611] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2176.568540][T27611] inet_sendmsg+0x147/0x5e0 [ 2176.573043][T27611] ? ipip_gro_receive+0x100/0x100 [ 2176.578073][T27611] sock_sendmsg+0xf2/0x170 [ 2176.582495][T27611] __sys_sendto+0x262/0x380 [ 2176.587005][T27611] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2176.592386][T27611] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2176.597949][T27611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2176.604191][T27611] ? fput_many+0x12c/0x1a0 [ 2176.608619][T27611] ? fput+0x1b/0x20 [ 2176.612433][T27611] ? ksys_write+0x1cf/0x290 [ 2176.617031][T27611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2176.622522][T27611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2176.627983][T27611] ? do_syscall_64+0x26/0x680 [ 2176.632671][T27611] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2176.638838][T27611] __x64_sys_sendto+0xe1/0x1a0 [ 2176.643623][T27611] do_syscall_64+0x103/0x680 [ 2176.648244][T27611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2176.654142][T27611] RIP: 0033:0x458da9 [ 2176.658037][T27611] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2176.677745][T27611] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2176.686158][T27611] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2176.694131][T27611] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2176.702110][T27611] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:20:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f0000000600)=""/240, &(0x7f0000000400)=0xf0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000005c0)=0x16c, 0x3e3) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffc, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffff44) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0xd6, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fa57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab69ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) pipe(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xffffff10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xcd, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xfc4b}], 0x1, &(0x7f0000000200)=""/20, 0x3d1}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000100), &(0x7f00000003c0)=0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x95) socket$packet(0x11, 0x0, 0x300) r3 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000380)=0x4) getsockname(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 2176.710088][T27611] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2176.718065][T27611] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8864, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000040)=[{&(0x7f0000001840)="f8", 0x1}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={r6, 0x6}, 0xc) socket$kcm(0x29, 0x5, 0x0) splice(r0, 0x0, r5, 0x0, 0x8, 0x0) 17:20:04 executing program 1 (fault-call:9 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:04 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8906, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2177.065494][T27631] FAULT_INJECTION: forcing a failure. [ 2177.065494][T27631] name failslab, interval 1, probability 0, space 0, times 0 [ 2177.113542][T27631] CPU: 1 PID: 27631 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2177.121143][T27631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2177.131215][T27631] Call Trace: [ 2177.134534][T27631] dump_stack+0x172/0x1f0 [ 2177.138901][T27631] should_fail.cold+0xa/0x15 [ 2177.143522][T27631] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2177.149351][T27631] ? ___might_sleep+0x163/0x280 [ 2177.154226][T27631] __should_failslab+0x121/0x190 [ 2177.159192][T27631] should_failslab+0x9/0x14 [ 2177.163714][T27631] __kmalloc+0x2dc/0x740 [ 2177.167984][T27631] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2177.174253][T27631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2177.180542][T27631] ? tls_get_rec+0x104/0x590 [ 2177.185161][T27631] tls_get_rec+0x104/0x590 [ 2177.189606][T27631] tls_sw_sendmsg+0xda5/0x17b0 [ 2177.194403][T27631] ? tx_work_handler+0xf0/0xf0 [ 2177.199184][T27631] ? aa_sk_perm+0x288/0x880 [ 2177.203710][T27631] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2177.209276][T27631] inet_sendmsg+0x147/0x5e0 [ 2177.213796][T27631] ? ipip_gro_receive+0x100/0x100 [ 2177.218839][T27631] sock_sendmsg+0xf2/0x170 [ 2177.223275][T27631] __sys_sendto+0x262/0x380 [ 2177.227801][T27631] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2177.233196][T27631] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2177.238782][T27631] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2177.245060][T27631] ? fput_many+0x12c/0x1a0 [ 2177.249497][T27631] ? fput+0x1b/0x20 [ 2177.253325][T27631] ? ksys_write+0x1cf/0x290 [ 2177.253345][T27631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2177.253358][T27631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2177.253373][T27631] ? do_syscall_64+0x26/0x680 [ 2177.253398][T27631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2177.263375][T27631] __x64_sys_sendto+0xe1/0x1a0 [ 2177.263396][T27631] do_syscall_64+0x103/0x680 [ 2177.263416][T27631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2177.263427][T27631] RIP: 0033:0x458da9 [ 2177.263450][T27631] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2177.324202][T27631] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2177.332670][T27631] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2177.340670][T27631] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2177.350385][T27631] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2177.358374][T27631] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2177.366366][T27631] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="8f0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={0x0, &(0x7f0000000100)=""/4096, 0x0, 0x1000}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$rxrpc(0x21, 0x2, 0xa) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000002740)={0x1, [0x0]}, &(0x7f0000002780)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000027c0)={r3, 0x5, 0x20}, 0xc) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) socketpair(0x4, 0x80000, 0xd70, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$bt_sco(r4, &(0x7f0000001180)={0x1f, {0x0, 0x5}}, 0x8) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000001400)) 17:20:05 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xf000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200, &(0x7f0000000000)="006ffc374d003dbb003b00") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x477) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r2, 0x0, 0x1, 0x8, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:20:05 executing program 1 (fault-call:9 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040)=0x7ff, 0x4) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0xffffffffffffffbb) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, &(0x7f0000000080)=0x40, 0x4) 17:20:05 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8000a0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2178.282862][T27658] FAULT_INJECTION: forcing a failure. [ 2178.282862][T27658] name failslab, interval 1, probability 0, space 0, times 0 [ 2178.334369][T27658] CPU: 0 PID: 27658 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2178.342060][T27658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2178.352620][T27658] Call Trace: [ 2178.352652][T27658] dump_stack+0x172/0x1f0 [ 2178.352675][T27658] should_fail.cold+0xa/0x15 [ 2178.352695][T27658] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2178.352718][T27658] ? ___might_sleep+0x163/0x280 [ 2178.352740][T27658] __should_failslab+0x121/0x190 [ 2178.352763][T27658] should_failslab+0x9/0x14 [ 2178.385069][T27658] kmem_cache_alloc_node_trace+0x270/0x720 [ 2178.390920][T27658] __kmalloc_node_track_caller+0x3d/0x70 [ 2178.396581][T27658] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2178.401994][T27658] __alloc_skb+0x10b/0x5e0 [ 2178.406432][T27658] ? skb_trim+0x190/0x190 [ 2178.410775][T27658] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2178.416496][T27658] ? tcp_enter_memory_pressure+0x130/0x130 [ 2178.416514][T27658] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2178.416534][T27658] sk_stream_alloc_skb+0x326/0xd80 [ 2178.433277][T27658] do_tcp_sendpages+0xafa/0x1b70 [ 2178.438244][T27658] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2178.443554][T27658] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2178.449304][T27658] tls_push_sg+0x1de/0x680 [ 2178.453747][T27658] tls_tx_records+0x3c8/0x760 [ 2178.458451][T27658] tls_push_record+0x1f67/0x3580 [ 2178.463430][T27658] ? tls_tx_records+0x760/0x760 [ 2178.468390][T27658] ? lock_downgrade+0x880/0x880 [ 2178.473264][T27658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2178.479525][T27658] ? kasan_check_read+0x11/0x20 [ 2178.484395][T27658] bpf_exec_tx_verdict+0xe30/0x1280 [ 2178.489641][T27658] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2178.495371][T27658] ? tls_push_record+0x3580/0x3580 [ 2178.500733][T27658] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2178.507095][T27658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2178.513354][T27658] ? sk_msg_alloc+0x62d/0x8d0 [ 2178.518090][T27658] tls_sw_sendmsg+0x107c/0x17b0 [ 2178.522434][ C1] net_ratelimit: 12 callbacks suppressed [ 2178.522443][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2178.522965][T27658] ? tx_work_handler+0xf0/0xf0 [ 2178.528648][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2178.534335][T27658] ? aa_sk_perm+0x288/0x880 [ 2178.534357][T27658] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2178.534378][T27658] inet_sendmsg+0x147/0x5e0 [ 2178.534396][T27658] ? ipip_gro_receive+0x100/0x100 [ 2178.539307][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2178.544887][T27658] sock_sendmsg+0xf2/0x170 [ 2178.544906][T27658] __sys_sendto+0x262/0x380 [ 2178.544924][T27658] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2178.544945][T27658] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2178.549941][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2178.555433][T27658] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2178.555447][T27658] ? fput_many+0x12c/0x1a0 [ 2178.555462][T27658] ? fput+0x1b/0x20 [ 2178.555479][T27658] ? ksys_write+0x1cf/0x290 [ 2178.615482][T27658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2178.620973][T27658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2178.626548][T27658] ? do_syscall_64+0x26/0x680 [ 2178.631267][T27658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2178.637358][T27658] __x64_sys_sendto+0xe1/0x1a0 [ 2178.642146][T27658] do_syscall_64+0x103/0x680 [ 2178.646766][T27658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2178.652698][T27658] RIP: 0033:0x458da9 [ 2178.656609][T27658] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2178.676490][T27658] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 17:20:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x81, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x7f}, @in6={0xa, 0x4e22, 0x4, @local, 0x1}, @in6={0xa, 0x4e23, 0xd9c6, @dev={0xfe, 0x80, [], 0x1f}, 0x31}, @in={0x2, 0x4e22, @loopback}], 0x80) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000034, 0x0, 0x0, 0xfffff014}, {0x80000006}]}, 0x10) 17:20:05 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20, 0x3, 0x0, 0x0, 0x72}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(r0, &(0x7f00000003c0)=' ', 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380)=0x1, 0x12) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x100000890e, &(0x7f0000000140)="7053c2de6cc5") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x9, 0x1}, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000180)='syz0\x00', 0x1ff) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000240)=0xfffffffffffffffe, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 2178.684913][T27658] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2178.692978][T27658] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2178.700956][T27658] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2178.708937][T27658] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2178.716918][T27658] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2178.762370][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2178.768218][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:20:06 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xf0ffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:06 executing program 1 (fault-call:9 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:06 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010407051dfffd946fa2830020201e0009000600021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)={0x10}) [ 2179.031372][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2179.097453][T27686] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2179.111348][T27681] FAULT_INJECTION: forcing a failure. [ 2179.111348][T27681] name failslab, interval 1, probability 0, space 0, times 0 [ 2179.128011][T27686] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2179.156503][T27681] CPU: 1 PID: 27681 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2179.164185][T27681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2179.165123][T27686] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2179.174264][T27681] Call Trace: [ 2179.174295][T27681] dump_stack+0x172/0x1f0 [ 2179.174319][T27681] should_fail.cold+0xa/0x15 [ 2179.174339][T27681] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2179.174362][T27681] ? ___might_sleep+0x163/0x280 [ 2179.174384][T27681] __should_failslab+0x121/0x190 [ 2179.174408][T27681] should_failslab+0x9/0x14 [ 2179.186915][T27681] kmem_cache_alloc_node+0x264/0x710 [ 2179.195823][T27681] __alloc_skb+0xd5/0x5e0 [ 2179.195839][T27681] ? skb_trim+0x190/0x190 [ 2179.195852][T27681] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2179.195865][T27681] ? tcp_enter_memory_pressure+0x130/0x130 [ 2179.195884][T27681] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2179.209622][T27689] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 2179.211693][T27681] sk_stream_alloc_skb+0x326/0xd80 [ 2179.211716][T27681] do_tcp_sendpages+0xafa/0x1b70 [ 2179.211752][T27681] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2179.255646][T27681] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2179.255666][T27681] tls_push_sg+0x1de/0x680 [ 2179.255693][T27681] tls_tx_records+0x3c8/0x760 [ 2179.265766][T27681] tls_push_record+0x1f67/0x3580 [ 2179.265800][T27681] ? tls_tx_records+0x760/0x760 [ 2179.265822][T27681] ? lock_downgrade+0x880/0x880 [ 2179.301075][T27681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2179.307436][T27681] ? kasan_check_read+0x11/0x20 [ 2179.312340][T27681] bpf_exec_tx_verdict+0xe30/0x1280 [ 2179.317572][T27681] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2179.323404][T27681] ? tls_push_record+0x3580/0x3580 [ 2179.328615][T27681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2179.334883][T27681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2179.341154][T27681] ? sk_msg_alloc+0x62d/0x8d0 [ 2179.345859][T27681] tls_sw_sendmsg+0x107c/0x17b0 [ 2179.352148][T27681] ? tx_work_handler+0xf0/0xf0 [ 2179.356941][T27681] ? aa_sk_perm+0x288/0x880 [ 2179.361471][T27681] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2179.367050][T27681] inet_sendmsg+0x147/0x5e0 [ 2179.371574][T27681] ? ipip_gro_receive+0x100/0x100 [ 2179.376637][T27681] sock_sendmsg+0xf2/0x170 [ 2179.381080][T27681] __sys_sendto+0x262/0x380 [ 2179.385626][T27681] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2179.391023][T27681] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2179.396685][T27681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2179.402941][T27681] ? fput_many+0x12c/0x1a0 [ 2179.402955][T27681] ? fput+0x1b/0x20 [ 2179.402965][T27681] ? ksys_write+0x1cf/0x290 [ 2179.402984][T27681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2179.403005][T27681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2179.426699][T27681] ? do_syscall_64+0x26/0x680 [ 2179.431681][T27681] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2179.437781][T27681] __x64_sys_sendto+0xe1/0x1a0 [ 2179.442572][T27681] do_syscall_64+0x103/0x680 [ 2179.447278][T27681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2179.453189][T27681] RIP: 0033:0x458da9 [ 2179.457106][T27681] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2179.476739][T27681] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2179.486270][T27681] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2179.494261][T27681] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2179.502364][T27681] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2179.502373][T27681] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2179.502380][T27681] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2179.633438][ T27] audit: type=1800 audit(1558113606.889:374): pid=27671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name=68756765746C04 dev="sda1" ino=17782 res=0 17:20:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="900200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:07 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x1000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x10004000000002, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r1, &(0x7f0000000000), 0x548, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0xffffffffffffff00, 0x0}}], 0x16b46c52a370d45, 0x42, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) socket(0x0, 0x0, 0x0) 17:20:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000000c0)=0x8001, 0x8) socket$l2tp(0x18, 0x1, 0x1) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 17:20:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000080)="00000000000000fd9c7230b6376fd8bfc12409726467f5843434dbd0") r1 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4c, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cf0108033b00000002030000020000009d030000070000ffaaa50000000000000000006d00b7b0445c79633b88c7d410fbab4c62c58649ca586c2b2bde4fd4c58c525ccd059f2d35ea637d53584283b5977a52e061d3d2a68c671f799c825cf5cc70ccf04fad3ed37b832ebdc6b70475e21a9dfe2d860661a0c74d8bafcf06a0c21ef0eac4d3a4340ec25136d560ce80d722f2d973dff6fad8a3e4a18c83f696c5cea7abe24db5e0f3ff55d199507b8a9a2b8f61e7fd456dcef9cf473a2a62c2e8ee5e343e6d5f980efa7c9dcd3f01aa114223188245dec98941880c17b4a5368b69acc64c3419e483278b28d6ee2f2bfbe71f618070a944e1000000000000"], 0x61) 17:20:07 executing program 1 (fault-call:9 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:07 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x2000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2180.165459][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2180.201371][T27710] FAULT_INJECTION: forcing a failure. [ 2180.201371][T27710] name failslab, interval 1, probability 0, space 0, times 0 [ 2180.241694][T27710] CPU: 0 PID: 27710 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2180.249297][T27710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2180.259394][T27710] Call Trace: [ 2180.262706][T27710] dump_stack+0x172/0x1f0 [ 2180.267073][T27710] should_fail.cold+0xa/0x15 [ 2180.271706][T27710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2180.277535][T27710] ? ___might_sleep+0x163/0x280 [ 2180.282404][T27710] __should_failslab+0x121/0x190 [ 2180.287361][T27710] should_failslab+0x9/0x14 [ 2180.291886][T27710] kmem_cache_alloc_node+0x264/0x710 [ 2180.308164][T27710] __alloc_skb+0xd5/0x5e0 [ 2180.312522][T27710] ? skb_trim+0x190/0x190 [ 2180.316870][T27710] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2180.322627][T27710] ? tcp_enter_memory_pressure+0x130/0x130 [ 2180.328452][T27710] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2180.334287][T27710] sk_stream_alloc_skb+0x326/0xd80 [ 2180.339431][T27710] do_tcp_sendpages+0xafa/0x1b70 [ 2180.344413][T27710] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2180.350222][T27710] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2180.355971][T27710] tls_push_sg+0x1de/0x680 [ 2180.360428][T27710] tls_tx_records+0x3c8/0x760 [ 2180.365159][T27710] tls_push_record+0x1f67/0x3580 [ 2180.370133][T27710] ? tls_tx_records+0x760/0x760 [ 2180.375039][T27710] ? lock_downgrade+0x880/0x880 [ 2180.379909][T27710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2180.386175][T27710] ? kasan_check_read+0x11/0x20 [ 2180.391251][T27710] bpf_exec_tx_verdict+0xe30/0x1280 [ 2180.396467][T27710] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2180.402200][T27710] ? tls_push_record+0x3580/0x3580 [ 2180.407388][T27710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2180.413653][T27710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2180.419910][T27710] ? sk_msg_alloc+0x62d/0x8d0 [ 2180.424637][T27710] tls_sw_sendmsg+0x107c/0x17b0 [ 2180.429529][T27710] ? tx_work_handler+0xf0/0xf0 [ 2180.434323][T27710] ? aa_sk_perm+0x288/0x880 17:20:07 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x3000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2180.438856][T27710] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2180.444429][T27710] inet_sendmsg+0x147/0x5e0 [ 2180.448975][T27710] ? ipip_gro_receive+0x100/0x100 [ 2180.454019][T27710] sock_sendmsg+0xf2/0x170 [ 2180.458457][T27710] __sys_sendto+0x262/0x380 [ 2180.462986][T27710] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2180.468388][T27710] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2180.473963][T27710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2180.480216][T27710] ? fput_many+0x12c/0x1a0 [ 2180.484655][T27710] ? fput+0x1b/0x20 [ 2180.488480][T27710] ? ksys_write+0x1cf/0x290 [ 2180.493186][T27710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2180.498665][T27710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2180.504143][T27710] ? do_syscall_64+0x26/0x680 [ 2180.508838][T27710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2180.514930][T27710] __x64_sys_sendto+0xe1/0x1a0 [ 2180.519721][T27710] do_syscall_64+0x103/0x680 [ 2180.524333][T27710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2180.530233][T27710] RIP: 0033:0x458da9 [ 2180.534170][T27710] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2180.553801][T27710] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2180.562229][T27710] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2180.570297][T27710] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2180.578276][T27710] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2180.586256][T27710] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2180.594235][T27710] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2180.602376][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2180.608268][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:20:07 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:07 executing program 1 (fault-call:9 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:08 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x5000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:08 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000c00)=0x7f, 0x4) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000140)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000540)={r0}) getpeername$tipc(r1, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) bind$nfc_llcp(r1, &(0x7f0000000580)={0x27, 0x0, 0x0, 0x0, 0x7, 0x9, "2497de6f782043c02bed1451a7605a157034946ddc0458c91da7141326b3c213e570f1f3fbb8901b1ac60217410921700e2e431b178e33ed89c00557f87248", 0x3d}, 0x60) getsockopt$nfc_llcp(r1, 0x118, 0x5, &(0x7f0000000200)=""/99, 0x63) r2 = socket$inet(0x2, 0x85, 0x7) r3 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000380)=r3) accept4(r2, 0x0, &(0x7f0000000340), 0x80800) getsockname$unix(r1, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e) [ 2180.867046][T27731] FAULT_INJECTION: forcing a failure. [ 2180.867046][T27731] name failslab, interval 1, probability 0, space 0, times 0 [ 2180.912893][T27731] CPU: 0 PID: 27731 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2180.920519][T27731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2180.930588][T27731] Call Trace: [ 2180.933915][T27731] dump_stack+0x172/0x1f0 [ 2180.938274][T27731] should_fail.cold+0xa/0x15 [ 2180.942889][T27731] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2180.948719][T27731] ? ___might_sleep+0x163/0x280 [ 2180.953600][T27731] __should_failslab+0x121/0x190 [ 2180.958558][T27731] should_failslab+0x9/0x14 [ 2180.963078][T27731] kmem_cache_alloc_node_trace+0x270/0x720 [ 2180.968920][T27731] __kmalloc_node_track_caller+0x3d/0x70 [ 2180.974564][T27731] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2180.979955][T27731] __alloc_skb+0x10b/0x5e0 [ 2180.984387][T27731] ? skb_trim+0x190/0x190 [ 2180.988723][T27731] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2180.994454][T27731] ? tcp_enter_memory_pressure+0x130/0x130 [ 2181.000268][T27731] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2181.006092][T27731] sk_stream_alloc_skb+0x326/0xd80 [ 2181.011220][T27731] do_tcp_sendpages+0xafa/0x1b70 [ 2181.016180][T27731] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2181.021474][T27731] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2181.027204][T27731] tls_push_sg+0x1de/0x680 [ 2181.031644][T27731] tls_tx_records+0x3c8/0x760 [ 2181.036422][T27731] tls_push_record+0x1f67/0x3580 [ 2181.041382][T27731] ? tls_tx_records+0x760/0x760 [ 2181.046297][T27731] ? lock_downgrade+0x880/0x880 [ 2181.051151][T27731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2181.057402][T27731] ? kasan_check_read+0x11/0x20 [ 2181.062266][T27731] bpf_exec_tx_verdict+0xe30/0x1280 [ 2181.067491][T27731] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2181.073232][T27731] ? tls_push_record+0x3580/0x3580 [ 2181.078447][T27731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2181.084728][T27731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2181.090985][T27731] ? sk_msg_alloc+0x62d/0x8d0 [ 2181.095690][T27731] tls_sw_sendmsg+0x107c/0x17b0 [ 2181.100574][T27731] ? tx_work_handler+0xf0/0xf0 [ 2181.105479][T27731] ? aa_sk_perm+0x288/0x880 [ 2181.110182][T27731] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2181.115749][T27731] inet_sendmsg+0x147/0x5e0 [ 2181.120273][T27731] ? ipip_gro_receive+0x100/0x100 [ 2181.125317][T27731] sock_sendmsg+0xf2/0x170 [ 2181.129762][T27731] __sys_sendto+0x262/0x380 [ 2181.134298][T27731] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2181.139685][T27731] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2181.145259][T27731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2181.151505][T27731] ? fput_many+0x12c/0x1a0 [ 2181.155929][T27731] ? fput+0x1b/0x20 [ 2181.159744][T27731] ? ksys_write+0x1cf/0x290 [ 2181.164259][T27731] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2181.169721][T27731] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2181.175192][T27731] ? do_syscall_64+0x26/0x680 [ 2181.179884][T27731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2181.185982][T27731] __x64_sys_sendto+0xe1/0x1a0 [ 2181.190758][T27731] do_syscall_64+0x103/0x680 [ 2181.195360][T27731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2181.201252][T27731] RIP: 0033:0x458da9 [ 2181.205151][T27731] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2181.224760][T27731] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2181.233193][T27731] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2181.241177][T27731] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2181.249172][T27731] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2181.257158][T27731] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2181.265137][T27731] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="910200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:09 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x6000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:09 executing program 1 (fault-call:9 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x102d4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x9c, r2, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7badfd84}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 17:20:09 executing program 5: r0 = epoll_create1(0x0) r1 = socket(0x11, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000080)=0x8) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)={r1, 0x9, 0x7, "efa500eb6fc46339ecec852d5e45b733b59ea3cb0b30850050752ed80dfd1ccdf7358b89fa73075def811038a330c9c175eed201d6e4d50d925cd08eb90cfc0cf67433"}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x347e9ba3}, 0x8) socket$inet6_dccp(0xa, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x300, r0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)={@remote, @rand_addr=0x8, 0x1, 0x5, [@dev={0xac, 0x14, 0x14, 0xd}, @remote, @local, @broadcast, @loopback]}, 0x24) 17:20:09 executing program 2: r0 = socket(0x10, 0x80002, 0x1000000000000a) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x33fe0}}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x8, 0x20}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e20, 0xffffffff, @remote, 0x97}}, 0x7, 0x0, 0xd433, 0x5, 0x1}, &(0x7f0000000340)=0x98) 17:20:09 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x7000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2182.351723][T27758] FAULT_INJECTION: forcing a failure. [ 2182.351723][T27758] name failslab, interval 1, probability 0, space 0, times 0 [ 2182.407201][T27758] CPU: 1 PID: 27758 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2182.414810][T27758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.424988][T27758] Call Trace: [ 2182.428303][T27758] dump_stack+0x172/0x1f0 [ 2182.432660][T27758] should_fail.cold+0xa/0x15 [ 2182.437263][T27758] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2182.443085][T27758] ? ___might_sleep+0x163/0x280 [ 2182.447958][T27758] __should_failslab+0x121/0x190 [ 2182.452908][T27758] should_failslab+0x9/0x14 [ 2182.457422][T27758] __kmalloc+0x2dc/0x740 [ 2182.461671][T27758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2182.467926][T27758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2182.474183][T27758] ? tls_get_rec+0x104/0x590 [ 2182.479176][T27758] tls_get_rec+0x104/0x590 [ 2182.483618][T27758] tls_sw_sendmsg+0xda5/0x17b0 [ 2182.488409][T27758] ? tx_work_handler+0xf0/0xf0 [ 2182.493182][T27758] ? aa_sk_perm+0x288/0x880 [ 2182.497700][T27758] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2182.503263][T27758] inet_sendmsg+0x147/0x5e0 [ 2182.507799][T27758] ? ipip_gro_receive+0x100/0x100 [ 2182.512829][T27758] sock_sendmsg+0xf2/0x170 [ 2182.517260][T27758] __sys_sendto+0x262/0x380 [ 2182.521773][T27758] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2182.527164][T27758] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2182.532754][T27758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2182.539016][T27758] ? fput_many+0x12c/0x1a0 [ 2182.543436][T27758] ? fput+0x1b/0x20 [ 2182.547251][T27758] ? ksys_write+0x1cf/0x290 [ 2182.551766][T27758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2182.557265][T27758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2182.562729][T27758] ? do_syscall_64+0x26/0x680 [ 2182.567414][T27758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.573501][T27758] __x64_sys_sendto+0xe1/0x1a0 [ 2182.578285][T27758] do_syscall_64+0x103/0x680 [ 2182.582891][T27758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.588793][T27758] RIP: 0033:0x458da9 [ 2182.592702][T27758] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2182.612343][T27758] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2182.620778][T27758] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2182.628763][T27758] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2182.636780][T27758] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2182.644861][T27758] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2182.652952][T27758] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x76, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000001100)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f0c3c123f319bd070") socket$pppoe(0x18, 0x1, 0x0) write(r1, &(0x7f0000000040)='$', 0x1) 17:20:10 executing program 1 (fault-call:9 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:10 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2182.857708][T27774] FAULT_INJECTION: forcing a failure. [ 2182.857708][T27774] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2182.889176][T27774] CPU: 1 PID: 27774 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2182.896783][T27774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.906855][T27774] Call Trace: [ 2182.906885][T27774] dump_stack+0x172/0x1f0 [ 2182.906910][T27774] should_fail.cold+0xa/0x15 [ 2182.906937][T27774] ? __sys_sendto+0x262/0x380 [ 2182.919150][T27774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2182.929666][T27774] should_fail_alloc_page+0x50/0x60 [ 2182.934880][T27774] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2182.940274][T27774] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2182.945929][T27774] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2182.951765][T27774] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2182.957427][T27774] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2182.963693][T27774] alloc_pages_current+0x107/0x210 [ 2182.968823][T27774] skb_page_frag_refill+0x277/0x460 [ 2182.974139][T27774] sk_page_frag_refill+0x55/0x1f0 [ 2182.979276][T27774] sk_msg_alloc+0x10e/0x8d0 [ 2182.983803][T27774] tls_sw_sendmsg+0x63c/0x17b0 [ 2182.988625][T27774] ? tx_work_handler+0xf0/0xf0 [ 2182.993397][T27774] ? aa_sk_perm+0x288/0x880 [ 2182.993420][T27774] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2182.993441][T27774] inet_sendmsg+0x147/0x5e0 [ 2182.993455][T27774] ? ipip_gro_receive+0x100/0x100 [ 2182.993477][T27774] sock_sendmsg+0xf2/0x170 [ 2183.003528][T27774] __sys_sendto+0x262/0x380 [ 2183.003549][T27774] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2183.003569][T27774] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2183.003609][T27774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2183.003623][T27774] ? fput_many+0x12c/0x1a0 [ 2183.003641][T27774] ? fput+0x1b/0x20 [ 2183.047444][T27774] ? ksys_write+0x1cf/0x290 [ 2183.051967][T27774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.057439][T27774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2183.062911][T27774] ? do_syscall_64+0x26/0x680 [ 2183.067616][T27774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.073711][T27774] __x64_sys_sendto+0xe1/0x1a0 [ 2183.078495][T27774] do_syscall_64+0x103/0x680 [ 2183.083143][T27774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.089057][T27774] RIP: 0033:0x458da9 [ 2183.092972][T27774] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2183.112687][T27774] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2183.121211][T27774] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2183.129374][T27774] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2183.137366][T27774] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2183.145350][T27774] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:20:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x300) [ 2183.153350][T27774] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:10 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000002e00)=[{{&(0x7f0000000040)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)="269241a53f7cd9fe6e3fb98b68ecb9bd4424e76fb3c6414bcc68a8c218817d2d9913738177d1ac208c7c409f8a70a35f212aacbcb9f9fdd215040f", 0x3b}], 0x1, &(0x7f0000000200)=[@txtime={{0x18}}], 0x18}}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000240)="eca566408316ce822786797fed569db4ca79860fa1335798bc270af9694b1732fbca72120b5ed3e5e7f8d3290e78a0fe5098d0c42c9cb2d5c29a860bc585f8cf2a966282852d9cac75e4f1831d842d7286ad899dc1066dcd457a009774f8cb", 0x5f}, {&(0x7f00000002c0)="236c240e240b9ada4b5d655478daeaf98016f15d9404a437f16ebb8ad6f93e03a9245f59fb3cb8be88f38a70096dc527494aa81906add6d3674cbac7b82732dcdb1bf58e5ef9fd6ce4b71629770b2f5b2445fb9937af121579acc34b72ef7059bab8655a618cd5ee1dd63f6b1b1b43f9", 0x70}, {&(0x7f0000000340)="b87e6bb1584cfcafab1e5c93dd8644d3df167d1f73b00eb0650f58ef64dbf922869493d3c51053f55dfcf719076eaeaa5a63d05f860809ed17a7a97ed38925c4e15ab96d2bdd2acb5c6fd90590e1f82bb4e64bc789df6aaa509c76cffe1045bfbaf038391d2beb19bff20b613d8418c513e0e1ddb82c9686c3dc988b176207c3b46afe08e48cb4dc040a904088b3022bef62ba31196bcb81cf5492b8d0e72cc17c773d642ef0ab8a142a46492182466eca57d74d3a17206825bf4d43fd4fa7b083348d91a70c926aebc89efe212e9cbf2c17768761b0c579060b4a015f1217055b", 0xe1}, {&(0x7f0000000440)="44e328a065e8c2a02cb10e22f0428aa7ee925670029927237feafdb836264f2ba9660d7d6bac22b07da2587522548118d91a7d49723779c7999f691d504adaa0a9038fda8c8a541793dde9c12a7d4d0c8f6296229b2ebbff7228aad43c9b090fdc5f06782cd133126b8d466ae8c8ca6c336d29f6340431f2860e0f923e2868c2993500f72691", 0x86}, {&(0x7f0000000500)="a27067e967adf1321afd001ecec3486a47c5986892c3e0014de8de7e23c83df158e61d9237928482647a0a7ab9d409c797553583871ee23c13d4179801505d2a", 0x40}, {&(0x7f0000000540)="95625f353757ff242b137bdf1ae5afe3219f1972d346dda560f4eae3a57fd5d44c30aa71822b2917985e4f4c88bef0a22cfa5df187f924bd44244ebb24cc37262a679c28d1a2487d183fd3bc2042a36cb6f5e6c2995d4ee146fbd82bcda34a57b472df0db39df17d86d87149fac84a717bcf2a547f25d54402996956a2b494f87c4a474685611ab95297", 0x8a}, {&(0x7f0000000600)="d8d982f9da8f63863b26e2958b9e14b92a8e0536c870f72cb29f719348142d15ac6effe8537a22b8301cd41490980f78cbe2eea9bc47db73a8e665", 0x3b}, {&(0x7f0000000640)="a0db39c4f6fb7d3a720285105bfd15e8cbb719f120fb38f14ae90b3b008528a19cc6171cc7784ba4bd62ac30d67a54be64eabfc30a1cce4fa8c1a7bd25b30ed14e6d70a2ad7bcd9c7d602271bf163775b96333aac2c3037cd19f69cda182f97f0145ac42893f4a398efd36082e21289ed7008ae9df05e62b765d537af412d7dc", 0x80}, {&(0x7f00000006c0)="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", 0x1000}], 0x9, &(0x7f0000001780)}}, {{&(0x7f00000017c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xffffffffffff4fbe, 0x0, "26891c7b5721b9c26b040472fa77fb5826ac4c658802b3de9bb09b815e379223e153a8b17c598746fdbf799a4990edd187587ec48e719afe12738b8a17b9b0", 0x17}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001840)="544839986713d935249d337c2c445d5cf70a8859147afd09f9de4fbbb2944b41d42babf8ca6e1e8cfc2ff2c94c1ea42957b75028fa3472dd439eaaef2484025d73f6873b96bd48501217cd06997aa446f692abc77a6c91923a29956f341989244df4f3dfe616d137ba8dffd08297a9b067bba6a8ea2f59941e5ffbbc311f6f175dff4c8ad2952642900bf86d2fb27247ce6e3ff5e83391e7bcf99365bfaa51ea14b494dfc9e76d0555d01e5257736480594b4124a6ffb928585538", 0xbb}, {&(0x7f0000001900)="85c9df05b1bf2800da546af4ea18fd03c18b6d4dba10387d5d9fa6c2bf46e747a59121b5f6663635cf21db45d6d988bf736f226cf8e2ab74f5f99269d29c90d31a6b0f7c98269b2f5242b439df13a537466a681a653b43fa4b9d03678711f48cea9a7b3c2478e2c221bc3b5345a9f37c09370863cc1ebb44fcc15e7ea3f5119ccb85bc61b204a5b6f73f53d978966e1f", 0x90}, {&(0x7f00000019c0)="a8a57cdacd1fc2eeb93b4ba5d585e5148a5ae48385d21e0880f619ae8e6e2fbfaa78a3698e7a5bf8f3820596f38905d67282fd545d52bcc95639c9eb1da4b33652fa21edecd44e7592c8a9c229fc7f981effbd4ee47b10b5862567bf6b4481b3e010f024353bd0eed42b1b0b3fd612fb30c81c9446a389d7c2e7a3bb1e4f4a4aaf292341ab8e0631afe0044e3b3fcc0d8d0feca6af30bcc86b5a075fa269689727bb2f2577a6fe2b530a05ae12e425b40907740df28b67a9abdf2b", 0xbb}, {&(0x7f0000001a80)="f4afcd897343c1b86ebe0c5b99d6113b4bdc6291619469a797038c6a3bef8f3d851bd974b79cc316ca6db7accdf0f03b82d252f3baef429c7a85ecef3ef324105710d41b6258b3b7cf3375aa24e31fdb9ca6", 0x52}, {&(0x7f0000001b00)="8fb40343602135689003327c", 0xc}, {&(0x7f0000001b40)="6e5f808eccfd583ca9aef9d0435b6aa24311881b778aeabcce243a1ce1bd279a7c32c73a955b73455e4eed7b17aabe8e91df363ce665439862246770f31244e67a29e077b6394af6598148909175a6c0f606f66cf65deea4adb3b5ef3ecea1d8b34beddbc2e9d27f18c22a35ac49973afcb967ee1f122a1c10b6c1820e3a4c82f7203896edb55cd019b1b08d7e1d2c078417937dfbcf4aa5627913923d71f62dad73c61be4bce11a2dbcb07132fa618cb1731d152363a825599d989ca8999673cadef1094d59c3d2518295205f3a1140aaec6ce5f10f4391358d645f5eeecb349e2ee53b", 0xe4}, {&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)="61b424ba3ddfee9a9c33", 0xa}, {&(0x7f0000002c80)="9d9c7aaceff4b1d7c0a436e759789eb5cb5c64da3f23629b19513849ee246b964201c53a360a1486ddebf081de030de05e97c8c0c4322b7d", 0x38}], 0x9, &(0x7f0000002d80)=[@txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}], 0x48}}], 0x3, 0x40000) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007f6000fe01b2403b7bbb0a60000004a86302910000003900050008000a00030000000d000500000000000400c78b800823090400009d566885b167320b00dc1338d584136ef75afb83de4400000000", 0x55}], 0x1}, 0x0) [ 2183.393182][T27789] IPv6: NLM_F_CREATE should be specified when creating new route [ 2183.412839][T27789] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 2183.420082][T27789] IPv6: NLM_F_CREATE should be set when creating new route [ 2183.427397][T27789] IPv6: NLM_F_CREATE should be set when creating new route [ 2183.464284][T27791] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 17:20:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="920200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@initdev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x800000000005}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x4) 17:20:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8060000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:11 executing program 1 (fault-call:9 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0x3ff, 0x4) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@local, @multicast1, 0x1, 0x2, [@multicast2, @multicast1]}, 0x18) getsockopt$sock_buf(r0, 0x1, 0x23, 0x0, &(0x7f0000000080)=0xbf) [ 2183.889235][ C1] net_ratelimit: 9 callbacks suppressed [ 2183.889246][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:20:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xd000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2183.937456][T27800] FAULT_INJECTION: forcing a failure. [ 2183.937456][T27800] name failslab, interval 1, probability 0, space 0, times 0 [ 2183.959183][T27800] CPU: 0 PID: 27800 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2183.966786][T27800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2183.976860][T27800] Call Trace: [ 2183.980185][T27800] dump_stack+0x172/0x1f0 17:20:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x28000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2183.984549][T27800] should_fail.cold+0xa/0x15 [ 2183.989163][T27800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2183.995363][T27800] ? ___might_sleep+0x163/0x280 [ 2184.000324][T27800] __should_failslab+0x121/0x190 [ 2184.005329][T27800] should_failslab+0x9/0x14 [ 2184.009860][T27800] kmem_cache_alloc_node_trace+0x270/0x720 [ 2184.015722][T27800] __kmalloc_node_track_caller+0x3d/0x70 [ 2184.021387][T27800] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2184.026782][T27800] __alloc_skb+0x10b/0x5e0 [ 2184.031319][T27800] ? skb_trim+0x190/0x190 17:20:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@initdev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x800000000005}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x4) [ 2184.035674][T27800] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2184.041410][T27800] ? tcp_enter_memory_pressure+0x130/0x130 [ 2184.047241][T27800] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2184.053075][T27800] sk_stream_alloc_skb+0x326/0xd80 [ 2184.058221][T27800] do_tcp_sendpages+0xafa/0x1b70 [ 2184.063200][T27800] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2184.068513][T27800] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2184.074348][T27800] tls_push_sg+0x1de/0x680 [ 2184.078782][T27800] tls_tx_records+0x3c8/0x760 [ 2184.083488][T27800] tls_push_record+0x1f67/0x3580 [ 2184.088564][T27800] ? tls_tx_records+0x760/0x760 [ 2184.093455][T27800] ? lock_downgrade+0x880/0x880 [ 2184.098332][T27800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2184.104607][T27800] ? kasan_check_read+0x11/0x20 [ 2184.109494][T27800] bpf_exec_tx_verdict+0xe30/0x1280 [ 2184.114720][T27800] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2184.120555][T27800] ? tls_push_record+0x3580/0x3580 [ 2184.125772][T27800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2184.132039][T27800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:20:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x3f000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2184.138298][T27800] ? sk_msg_alloc+0x62d/0x8d0 [ 2184.143098][T27800] tls_sw_sendmsg+0x107c/0x17b0 [ 2184.147985][T27800] ? tx_work_handler+0xf0/0xf0 [ 2184.152766][T27800] ? aa_sk_perm+0x288/0x880 [ 2184.157300][T27800] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2184.162878][T27800] inet_sendmsg+0x147/0x5e0 [ 2184.167398][T27800] ? ipip_gro_receive+0x100/0x100 [ 2184.172439][T27800] sock_sendmsg+0xf2/0x170 [ 2184.176874][T27800] __sys_sendto+0x262/0x380 [ 2184.181394][T27800] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2184.186787][T27800] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2184.192361][T27800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2184.198634][T27800] ? fput_many+0x12c/0x1a0 [ 2184.203063][T27800] ? fput+0x1b/0x20 [ 2184.206881][T27800] ? ksys_write+0x1cf/0x290 [ 2184.211402][T27800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2184.216971][T27800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2184.222456][T27800] ? do_syscall_64+0x26/0x680 [ 2184.227186][T27800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2184.233468][T27800] __x64_sys_sendto+0xe1/0x1a0 [ 2184.238270][T27800] do_syscall_64+0x103/0x680 [ 2184.242889][T27800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2184.248886][T27800] RIP: 0033:0x458da9 [ 2184.252794][T27800] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2184.272417][T27800] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2184.280849][T27800] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 17:20:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x40000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2184.288842][T27800] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2184.296832][T27800] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2184.296841][T27800] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2184.296849][T27800] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) socket$rxrpc(0x21, 0x2, 0x2) mmap(&(0x7f000086d000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x8031, r0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001040)={'filter\x00', 0x4}, 0x68) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x208000, 0x800}, 0x18) 17:20:11 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x48}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f0000000040)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff3e}, 0x48) 17:20:12 executing program 1 (fault-call:9 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0xffffff38) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc, 0x10, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x60e, 0x68) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x17c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0xd6, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f020000000000000007a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab69ec15ef2818a179"}, 0x948d892669da99d4) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r4, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[], 0x0) 17:20:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x43050000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:12 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x8, 0x0, 0x9, 0x100000000000, 0x80}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r1, @in={{0x2, 0x4e24, @loopback}}}, &(0x7f0000000300)=0x84) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000100)=0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123d319bd070") r3 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) preadv(r2, &(0x7f0000001500)=[{&(0x7f0000000340)=""/189, 0xbd}, {&(0x7f0000000400)=""/3, 0x3}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/156, 0x9c}], 0x4, 0x1b) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg(r4, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x50, &(0x7f00000000c0), 0x2}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x69, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 17:20:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="930200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:12 executing program 2: syz_emit_ethernet(0x3b, &(0x7f0000000140)={@broadcast, @random="d261eedc3e8b", [{[], {0x8100, 0x5, 0x8, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x3, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xa0010000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r0 = socket$inet(0x2, 0x80004, 0xffff) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 17:20:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x1f) r2 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x1e, 0x100, 0x70bd2c, 0x25dfdbfe, {0x20}, [@typed={0x8, 0x25, @uid=r2}, @typed={0x8, 0x3d, @u32=0x7fff00000000000}]}, 0x24}, 0x1, 0x0, 0x0, 0x20048800}, 0x40000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x8}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 2185.054384][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:20:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x58000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2185.118814][T27849] FAULT_INJECTION: forcing a failure. [ 2185.118814][T27849] name failslab, interval 1, probability 0, space 0, times 0 17:20:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x800e0000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2185.208278][T27849] CPU: 1 PID: 27849 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2185.215976][T27849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2185.226052][T27849] Call Trace: [ 2185.229361][T27849] dump_stack+0x172/0x1f0 [ 2185.233716][T27849] should_fail.cold+0xa/0x15 [ 2185.238320][T27849] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2185.244156][T27849] ? ___might_sleep+0x163/0x280 [ 2185.249034][T27849] __should_failslab+0x121/0x190 [ 2185.254003][T27849] should_failslab+0x9/0x14 [ 2185.258523][T27849] kmem_cache_alloc_node+0x264/0x710 [ 2185.263838][T27849] __alloc_skb+0xd5/0x5e0 [ 2185.268177][T27849] ? skb_trim+0x190/0x190 [ 2185.268191][T27849] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2185.268202][T27849] ? tcp_enter_memory_pressure+0x130/0x130 [ 2185.268218][T27849] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2185.268237][T27849] sk_stream_alloc_skb+0x326/0xd80 [ 2185.295064][T27849] do_tcp_sendpages+0xafa/0x1b70 [ 2185.300039][T27849] ? sk_stream_alloc_skb+0xd80/0xd80 17:20:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x80350000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2185.305354][T27849] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2185.311106][T27849] tls_push_sg+0x1de/0x680 [ 2185.315574][T27849] tls_tx_records+0x3c8/0x760 [ 2185.320297][T27849] tls_push_record+0x1f67/0x3580 [ 2185.325276][T27849] ? tls_tx_records+0x760/0x760 [ 2185.330329][T27849] ? lock_downgrade+0x880/0x880 [ 2185.335208][T27849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2185.341574][T27849] ? kasan_check_read+0x11/0x20 [ 2185.346468][T27849] bpf_exec_tx_verdict+0xe30/0x1280 17:20:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x81000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2185.353554][T27849] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2185.359316][T27849] ? tls_push_record+0x3580/0x3580 [ 2185.364526][T27849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2185.370791][T27849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2185.377136][T27849] ? sk_msg_alloc+0x62d/0x8d0 [ 2185.381838][T27849] tls_sw_sendmsg+0x107c/0x17b0 [ 2185.386721][T27849] ? tx_work_handler+0xf0/0xf0 [ 2185.391496][T27849] ? aa_sk_perm+0x288/0x880 [ 2185.396027][T27849] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2185.401607][T27849] inet_sendmsg+0x147/0x5e0 17:20:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x86ddffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2185.406134][T27849] ? ipip_gro_receive+0x100/0x100 [ 2185.411173][T27849] sock_sendmsg+0xf2/0x170 [ 2185.415617][T27849] __sys_sendto+0x262/0x380 [ 2185.420150][T27849] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2185.425537][T27849] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2185.431197][T27849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2185.437456][T27849] ? fput_many+0x12c/0x1a0 [ 2185.441890][T27849] ? fput+0x1b/0x20 [ 2185.445716][T27849] ? ksys_write+0x1cf/0x290 [ 2185.450246][T27849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2185.455729][T27849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2185.461208][T27849] ? do_syscall_64+0x26/0x680 [ 2185.465896][T27849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2185.471983][T27849] __x64_sys_sendto+0xe1/0x1a0 [ 2185.476765][T27849] do_syscall_64+0x103/0x680 [ 2185.482930][T27849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2185.488929][T27849] RIP: 0033:0x458da9 [ 2185.492840][T27849] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2185.512468][T27849] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2185.520999][T27849] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2185.529001][T27849] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2185.536996][T27849] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2185.544990][T27849] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2185.552985][T27849] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2185.562414][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2185.568245][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:20:12 executing program 1 (fault-call:9 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=@ethtool_ringparam={0x6, 0x0, 0x70c000}}) 17:20:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x88470000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000040)=""/55, &(0x7f0000000080)=0x37) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r3 = accept4$inet(r1, &(0x7f0000000340)={0x2, 0x0, @multicast1}, &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_dccp_buf(r3, 0x21, 0xc0, &(0x7f00000003c0)=""/90, &(0x7f0000000440)=0x5a) [ 2185.863958][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2185.884752][T27901] FAULT_INJECTION: forcing a failure. [ 2185.884752][T27901] name failslab, interval 1, probability 0, space 0, times 0 [ 2185.930939][T27901] CPU: 1 PID: 27901 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2185.938541][T27901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2185.948621][T27901] Call Trace: [ 2185.952031][T27901] dump_stack+0x172/0x1f0 [ 2185.956391][T27901] should_fail.cold+0xa/0x15 [ 2185.961013][T27901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2185.966847][T27901] ? ___might_sleep+0x163/0x280 [ 2185.971724][T27901] __should_failslab+0x121/0x190 [ 2185.976677][T27901] should_failslab+0x9/0x14 [ 2185.981237][T27901] kmem_cache_alloc_node_trace+0x270/0x720 [ 2185.987082][T27901] __kmalloc_node_track_caller+0x3d/0x70 [ 2185.992745][T27901] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2185.998311][T27901] __alloc_skb+0x10b/0x5e0 [ 2186.002747][T27901] ? skb_trim+0x190/0x190 [ 2186.007087][T27901] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2186.012833][T27901] ? tcp_enter_memory_pressure+0x130/0x130 [ 2186.018676][T27901] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2186.024515][T27901] sk_stream_alloc_skb+0x326/0xd80 [ 2186.029651][T27901] do_tcp_sendpages+0xafa/0x1b70 [ 2186.034633][T27901] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2186.039965][T27901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2186.045719][T27901] tls_push_sg+0x1de/0x680 [ 2186.050180][T27901] tls_tx_records+0x3c8/0x760 [ 2186.054894][T27901] tls_push_record+0x1f67/0x3580 [ 2186.059873][T27901] ? tls_tx_records+0x760/0x760 [ 2186.064742][T27901] ? lock_downgrade+0x880/0x880 [ 2186.069622][T27901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.076001][T27901] ? kasan_check_read+0x11/0x20 [ 2186.080881][T27901] bpf_exec_tx_verdict+0xe30/0x1280 [ 2186.086109][T27901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2186.091863][T27901] ? tls_push_record+0x3580/0x3580 [ 2186.097072][T27901] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2186.103350][T27901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.109623][T27901] ? sk_msg_alloc+0x62d/0x8d0 [ 2186.114333][T27901] tls_sw_sendmsg+0x107c/0x17b0 [ 2186.119218][T27901] ? tx_work_handler+0xf0/0xf0 [ 2186.123995][T27901] ? aa_sk_perm+0x288/0x880 [ 2186.128518][T27901] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2186.134086][T27901] inet_sendmsg+0x147/0x5e0 [ 2186.138617][T27901] ? ipip_gro_receive+0x100/0x100 [ 2186.143659][T27901] sock_sendmsg+0xf2/0x170 [ 2186.148096][T27901] __sys_sendto+0x262/0x380 [ 2186.152664][T27901] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2186.158062][T27901] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2186.163732][T27901] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2186.169993][T27901] ? fput_many+0x12c/0x1a0 [ 2186.174426][T27901] ? fput+0x1b/0x20 [ 2186.178248][T27901] ? ksys_write+0x1cf/0x290 [ 2186.182768][T27901] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.188241][T27901] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.193717][T27901] ? do_syscall_64+0x26/0x680 [ 2186.198412][T27901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.204506][T27901] __x64_sys_sendto+0xe1/0x1a0 [ 2186.209293][T27901] do_syscall_64+0x103/0x680 [ 2186.213904][T27901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.219806][T27901] RIP: 0033:0x458da9 [ 2186.223716][T27901] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2186.243354][T27901] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2186.251793][T27901] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2186.259788][T27901] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2186.267772][T27901] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2186.275756][T27901] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2186.283736][T27901] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2186.362355][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2186.368547][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:20:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="940200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="b4000400000000003d000100000000009fa10000000000009500000000000000"], &(0x7f0000000500)='syzkaller\x00', 0x5, 0x351, &(0x7f000000cf3d)=""/195}, 0x238) 17:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x80fe, 0x2, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300021, 0x0, 0x0, @ipv4={[0x2, 0x0, 0x28], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x88480000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000140)=0x1c) getsockopt$inet6_buf(r2, 0x29, 0xff, &(0x7f0000000180)=""/196, &(0x7f0000000280)=0xc4) bind$bt_l2cap(r1, &(0x7f00000000c0), 0x395) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, r4, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x68b5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa56}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, &(0x7f0000000100)=0x165) sendfile(r1, r0, &(0x7f0000000040), 0x1800000000000) 17:20:13 executing program 1 (fault-call:9 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:13 executing program 5: 17:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000000c0)={@local, r2}, 0x14) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'ip6erspan0\x00', 0x1}, 0x18) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280), 0x4) 17:20:13 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x88640000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2186.639415][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:20:13 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000002900)=[{{&(0x7f0000000140)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/44, 0x2c}, {&(0x7f0000000200)=""/156, 0x9c}, {&(0x7f00000002c0)=""/185, 0xb9}], 0x3, &(0x7f00000003c0)=""/14, 0xe}, 0x8}, {{&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000480)=""/152, 0x98}, {&(0x7f0000000580)=""/46, 0x2e}, {&(0x7f00000005c0)=""/14, 0xe}, {&(0x7f0000000600)=""/204, 0xcc}, {&(0x7f0000000700)=""/216, 0xd8}, {&(0x7f0000000800)=""/177, 0xb1}, {&(0x7f00000008c0)=""/185, 0xb9}], 0x7, &(0x7f0000000a00)=""/244, 0xf4}, 0x4f0}, {{&(0x7f0000000b00)=@generic, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)=""/97, 0x61}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/234, 0xea}], 0x3, &(0x7f0000000d80)=""/94, 0x5e}, 0xff}, {{&(0x7f0000000e00)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e80)=""/94, 0x5e}], 0x1}, 0x20}, {{&(0x7f0000000f40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000fc0)=""/223, 0xdf}, {&(0x7f00000010c0)=""/22, 0x16}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/91, 0x5b}, {&(0x7f0000002180)=""/223, 0xdf}, {&(0x7f0000002280)=""/231, 0xe7}, {&(0x7f0000002380)=""/30, 0x1e}, {&(0x7f00000023c0)=""/39, 0x27}], 0x8}, 0x1}], 0x5, 0x10100, &(0x7f0000002a80)={0x0, 0x1c9c380}) sendto$inet6(r1, &(0x7f0000000040), 0xffb0, 0x0, 0x0, 0xffa8) listen(r0, 0x80) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000002480)=0x4) bind$inet6(r1, &(0x7f0000000540)={0xa, 0x4e20, 0x3, @loopback, 0xfffffffffffff2c5}, 0x1c) sendmsg(r1, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x0, 0x2, 0x8000) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000080)={0x1, {{0x2, 0x4e21, @local}}}, 0x88) [ 2186.683936][T27925] FAULT_INJECTION: forcing a failure. [ 2186.683936][T27925] name failslab, interval 1, probability 0, space 0, times 0 [ 2186.703485][T27925] CPU: 1 PID: 27925 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2186.711284][T27925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2186.721358][T27925] Call Trace: [ 2186.724667][T27925] dump_stack+0x172/0x1f0 [ 2186.729108][T27925] should_fail.cold+0xa/0x15 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x88a8ffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2186.733728][T27925] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2186.739555][T27925] ? ___might_sleep+0x163/0x280 [ 2186.744440][T27925] __should_failslab+0x121/0x190 [ 2186.749396][T27925] should_failslab+0x9/0x14 [ 2186.753920][T27925] __kmalloc+0x2dc/0x740 [ 2186.758532][T27925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2186.764879][T27925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.771162][T27925] ? tls_get_rec+0x104/0x590 [ 2186.775774][T27925] tls_get_rec+0x104/0x590 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x88caffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2186.780216][T27925] tls_sw_sendmsg+0xda5/0x17b0 [ 2186.785024][T27925] ? tx_work_handler+0xf0/0xf0 [ 2186.789802][T27925] ? aa_sk_perm+0x288/0x880 [ 2186.794330][T27925] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2186.799899][T27925] inet_sendmsg+0x147/0x5e0 [ 2186.804521][T27925] ? ipip_gro_receive+0x100/0x100 [ 2186.809565][T27925] sock_sendmsg+0xf2/0x170 [ 2186.814022][T27925] __sys_sendto+0x262/0x380 [ 2186.818549][T27925] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2186.823945][T27925] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2186.829530][T27925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2186.835797][T27925] ? fput_many+0x12c/0x1a0 [ 2186.840228][T27925] ? fput+0x1b/0x20 [ 2186.844048][T27925] ? ksys_write+0x1cf/0x290 [ 2186.848570][T27925] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.854058][T27925] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2186.859536][T27925] ? do_syscall_64+0x26/0x680 [ 2186.864232][T27925] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.870353][T27925] __x64_sys_sendto+0xe1/0x1a0 [ 2186.875142][T27925] do_syscall_64+0x103/0x680 [ 2186.879753][T27925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.885652][T27925] RIP: 0033:0x458da9 [ 2186.889553][T27925] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2186.909179][T27925] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2186.917615][T27925] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2186.925614][T27925] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2186.933610][T27925] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2186.941684][T27925] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2186.949667][T27925] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="950200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000200)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xffffffffffffff98) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040), 0x4) 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x89060000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x88caffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:14 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) recvfrom$rose(r0, &(0x7f0000000080)=""/4096, 0x1000, 0x100, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x1, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x40) connect$rose(r0, &(0x7f0000000040)=@full={0xb, @remote, @netrom, 0x0, [@rose, @remote, @bcast, @rose]}, 0x40) 17:20:14 executing program 1 (fault-call:9 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8dffffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2187.539070][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2187.558554][T27963] FAULT_INJECTION: forcing a failure. [ 2187.558554][T27963] name failslab, interval 1, probability 0, space 0, times 0 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xa0008000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2187.623103][T27963] CPU: 1 PID: 27963 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2187.630763][T27963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2187.640849][T27963] Call Trace: [ 2187.644168][T27963] dump_stack+0x172/0x1f0 [ 2187.648531][T27963] should_fail.cold+0xa/0x15 [ 2187.653230][T27963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2187.659174][T27963] ? ___might_sleep+0x163/0x280 [ 2187.664055][T27963] __should_failslab+0x121/0x190 [ 2187.669013][T27963] should_failslab+0x9/0x14 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xeaffffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:14 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xf5ffffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2187.673535][T27963] kmem_cache_alloc_node_trace+0x270/0x720 [ 2187.679383][T27963] __kmalloc_node_track_caller+0x3d/0x70 [ 2187.685072][T27963] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2187.690497][T27963] __alloc_skb+0x10b/0x5e0 [ 2187.694971][T27963] ? skb_trim+0x190/0x190 [ 2187.699352][T27963] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2187.705091][T27963] ? tcp_enter_memory_pressure+0x130/0x130 [ 2187.710929][T27963] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2187.716759][T27963] sk_stream_alloc_skb+0x326/0xd80 17:20:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xffffa888, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2187.722243][T27963] do_tcp_sendpages+0xafa/0x1b70 [ 2187.727222][T27963] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2187.732533][T27963] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2187.738271][T27963] tls_push_sg+0x1de/0x680 [ 2187.742713][T27963] tls_tx_records+0x3c8/0x760 [ 2187.747412][T27963] tls_push_record+0x1f67/0x3580 [ 2187.752384][T27963] ? tls_tx_records+0x760/0x760 [ 2187.757245][T27963] ? lock_downgrade+0x880/0x880 [ 2187.762106][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.768370][T27963] ? kasan_check_read+0x11/0x20 17:20:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xffffca88, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2187.773245][T27963] bpf_exec_tx_verdict+0xe30/0x1280 [ 2187.778466][T27963] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2187.784214][T27963] ? tls_push_record+0x3580/0x3580 [ 2187.789410][T27963] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2187.795686][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.801939][T27963] ? sk_msg_alloc+0x62d/0x8d0 [ 2187.806658][T27963] tls_sw_sendmsg+0x107c/0x17b0 [ 2187.811546][T27963] ? tx_work_handler+0xf0/0xf0 [ 2187.816327][T27963] ? aa_sk_perm+0x288/0x880 [ 2187.820854][T27963] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2187.826422][T27963] inet_sendmsg+0x147/0x5e0 [ 2187.830943][T27963] ? ipip_gro_receive+0x100/0x100 [ 2187.835997][T27963] sock_sendmsg+0xf2/0x170 [ 2187.840438][T27963] __sys_sendto+0x262/0x380 [ 2187.844973][T27963] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2187.850368][T27963] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2187.855944][T27963] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2187.862208][T27963] ? fput_many+0x12c/0x1a0 [ 2187.866640][T27963] ? fput+0x1b/0x20 [ 2187.870460][T27963] ? ksys_write+0x1cf/0x290 [ 2187.874987][T27963] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2187.880454][T27963] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2187.885927][T27963] ? do_syscall_64+0x26/0x680 [ 2187.890633][T27963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2187.896814][T27963] __x64_sys_sendto+0xe1/0x1a0 [ 2187.901618][T27963] do_syscall_64+0x103/0x680 [ 2187.906249][T27963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2187.912152][T27963] RIP: 0033:0x458da9 [ 2187.916049][T27963] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2187.916057][T27963] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2187.916070][T27963] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2187.916077][T27963] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2187.916085][T27963] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2187.916092][T27963] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2187.916099][T27963] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2187.916535][ C1] protocol 88fb is buggy, dev hsr_slave_0 17:20:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="960200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xffffdd86, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0xffffff65) 17:20:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x800000000000001, 0x9010000000000088) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x102d4) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000007c00)={0x2}, 0xb) readv(r1, &(0x7f00000003c0)=[{&(0x7f0000001040)=""/4096, 0x1000}], 0x1) 17:20:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x18, 0x249e1e, 0x8000000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000000), 0x0}, 0x18) 17:20:15 executing program 1 (fault-call:9 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:15 executing program 5: r0 = socket(0x10, 0x802, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000140)="405f94be9a9b1563272fed7e5a39e8892396132fe2308d7b736c4341a47fe1310b4d0c89ba1eb9de11215b4440edf97b77c1aec1aa1286a5cb1ac5d0183f769951ebd0f994e93f9c3b2bf5f6e9c5233b7cc5f5e56b455c4203720df5cd19570fae5cd98e7a9ec28eb7a521dedee749fd84556ba535f04bf9e31281cfb5fec027a1aa919933f7fa3dba9a618494982365ed1c7f6f", 0x94) write(r0, &(0x7f0000000040)="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", 0xfc) 17:20:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xfffff000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2188.539836][T27995] FAULT_INJECTION: forcing a failure. [ 2188.539836][T27995] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.579084][T27995] CPU: 1 PID: 27995 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2188.586779][T27995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2188.596943][T27995] Call Trace: [ 2188.596977][T27995] dump_stack+0x172/0x1f0 [ 2188.597002][T27995] should_fail.cold+0xa/0x15 [ 2188.597027][T27995] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2188.615038][T27995] ? ___might_sleep+0x163/0x280 [ 2188.615061][T27995] __should_failslab+0x121/0x190 [ 2188.615076][T27995] should_failslab+0x9/0x14 [ 2188.615092][T27995] __kmalloc+0x2dc/0x740 [ 2188.615109][T27995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2188.615132][T27995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2188.639959][T27995] ? tls_get_rec+0x104/0x590 [ 2188.650789][T27995] tls_get_rec+0x104/0x590 [ 2188.655228][T27995] tls_sw_sendmsg+0xda5/0x17b0 [ 2188.655261][T27995] ? tx_work_handler+0xf0/0xf0 [ 2188.664785][T27995] ? aa_sk_perm+0x288/0x880 [ 2188.669311][T27995] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2188.674907][T27995] inet_sendmsg+0x147/0x5e0 [ 2188.679420][T27995] ? ipip_gro_receive+0x100/0x100 [ 2188.684473][T27995] sock_sendmsg+0xf2/0x170 17:20:15 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xffffff8d, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2188.688912][T27995] __sys_sendto+0x262/0x380 [ 2188.693434][T27995] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2188.698826][T27995] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2188.704403][T27995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2188.710663][T27995] ? fput_many+0x12c/0x1a0 [ 2188.715095][T27995] ? fput+0x1b/0x20 [ 2188.718928][T27995] ? ksys_write+0x1cf/0x290 [ 2188.723449][T27995] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2188.728925][T27995] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2188.734398][T27995] ? do_syscall_64+0x26/0x680 [ 2188.739094][T27995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2188.745187][T27995] __x64_sys_sendto+0xe1/0x1a0 [ 2188.745208][T27995] do_syscall_64+0x103/0x680 [ 2188.745228][T27995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2188.745239][T27995] RIP: 0033:0x458da9 [ 2188.745260][T27995] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:20:16 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xffffffea, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2188.783994][T27995] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2188.792428][T27995] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2188.800552][T27995] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2188.808644][T27995] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2188.816644][T27995] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2188.824640][T27995] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'ifb0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) listen(r0, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}], 0x8, 0x0) [ 2188.848071][T28013] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 17:20:16 executing program 1 (fault-call:9 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2188.961315][T28022] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2189.143864][ C0] net_ratelimit: 10 callbacks suppressed [ 2189.143875][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2189.198862][T28032] FAULT_INJECTION: forcing a failure. [ 2189.198862][T28032] name failslab, interval 1, probability 0, space 0, times 0 [ 2189.229731][T28032] CPU: 0 PID: 28032 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2189.237324][T28032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2189.247397][T28032] Call Trace: [ 2189.250722][T28032] dump_stack+0x172/0x1f0 [ 2189.255081][T28032] should_fail.cold+0xa/0x15 [ 2189.259696][T28032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2189.265523][T28032] ? ___might_sleep+0x163/0x280 [ 2189.270398][T28032] __should_failslab+0x121/0x190 [ 2189.275434][T28032] should_failslab+0x9/0x14 [ 2189.279964][T28032] kmem_cache_alloc_node+0x264/0x710 [ 2189.285295][T28032] __alloc_skb+0xd5/0x5e0 [ 2189.289655][T28032] ? skb_trim+0x190/0x190 [ 2189.293993][T28032] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2189.294006][T28032] ? tcp_enter_memory_pressure+0x130/0x130 [ 2189.294022][T28032] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2189.294041][T28032] sk_stream_alloc_skb+0x326/0xd80 [ 2189.294068][T28032] do_tcp_sendpages+0xafa/0x1b70 [ 2189.305699][T28032] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2189.305720][T28032] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2189.305738][T28032] tls_push_sg+0x1de/0x680 [ 2189.305760][T28032] tls_tx_records+0x3c8/0x760 [ 2189.305777][T28032] tls_push_record+0x1f67/0x3580 [ 2189.305805][T28032] ? tls_tx_records+0x760/0x760 [ 2189.305826][T28032] ? lock_downgrade+0x880/0x880 [ 2189.332677][T28032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2189.332697][T28032] ? kasan_check_read+0x11/0x20 [ 2189.332716][T28032] bpf_exec_tx_verdict+0xe30/0x1280 [ 2189.332738][T28032] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2189.332757][T28032] ? tls_push_record+0x3580/0x3580 [ 2189.341945][T28032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2189.392424][T28032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2189.398695][T28032] ? sk_msg_alloc+0x62d/0x8d0 [ 2189.404758][T28032] tls_sw_sendmsg+0x107c/0x17b0 [ 2189.409663][T28032] ? tx_work_handler+0xf0/0xf0 [ 2189.414445][T28032] ? aa_sk_perm+0x288/0x880 [ 2189.418971][T28032] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2189.424542][T28032] inet_sendmsg+0x147/0x5e0 [ 2189.429063][T28032] ? ipip_gro_receive+0x100/0x100 [ 2189.434126][T28032] sock_sendmsg+0xf2/0x170 [ 2189.438568][T28032] __sys_sendto+0x262/0x380 [ 2189.443110][T28032] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2189.448525][T28032] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2189.454104][T28032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2189.460367][T28032] ? fput_many+0x12c/0x1a0 [ 2189.464809][T28032] ? fput+0x1b/0x20 [ 2189.468645][T28032] ? ksys_write+0x1cf/0x290 [ 2189.473182][T28032] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2189.480338][T28032] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2189.486685][T28032] ? do_syscall_64+0x26/0x680 [ 2189.491390][T28032] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2189.497480][T28032] __x64_sys_sendto+0xe1/0x1a0 [ 2189.502269][T28032] do_syscall_64+0x103/0x680 [ 2189.506879][T28032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2189.512782][T28032] RIP: 0033:0x458da9 [ 2189.516685][T28032] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2189.536397][T28032] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2189.544829][T28032] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2189.552816][T28032] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2189.560814][T28032] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2189.568797][T28032] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2189.577052][T28032] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="970200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:17 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xfffffff5, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:17 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000200)={r1, r2}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000280)=0x5) r3 = socket(0x2, 0x4, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r4 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000340)="ed56b6c5820500"/24, 0x18) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f00000000c0)) 17:20:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)={0x2, {{0xa, 0x4e20, 0x6, @mcast2, 0x81}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x0, @loopback, 0x9}}]}, 0x110) sendmmsg(r0, &(0x7f0000e8e000)=[{{&(0x7f00008b6000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x80, &(0x7f0000231ff0)=[{&(0x7f0000f89000)='t', 0x1}], 0x1}}], 0x1, 0x0) listen(r0, 0x400000000007) r1 = accept(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) getpeername$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@default, @rose, @bcast, @rose, @null, @null, @null, @rose]}, &(0x7f0000000080)=0x48) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x24) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x134, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x45}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x26}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffff}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffa}]}, 0x134}, 0x1, 0x0, 0x0, 0x20000010}, 0x40000) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000300)={{0xa, 0x4e24, 0x3, @loopback, 0x100000001}, {0xa, 0x4e20, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xfffffffffffffffe}, 0x5, [0x4, 0xfffffffffffffff7, 0x1f, 0x1fe6, 0x5, 0x7987, 0x5, 0xfbd205c]}, 0x5c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 17:20:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f719bd070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x22, 0x847}, 0x14}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0x201, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0', "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"}, 0x1004) 17:20:17 executing program 1 (fault-call:9 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2189.911222][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2189.953889][T28049] FAULT_INJECTION: forcing a failure. [ 2189.953889][T28049] name failslab, interval 1, probability 0, space 0, times 0 [ 2189.969394][T28049] CPU: 0 PID: 28049 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2189.976978][T28049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2189.987232][T28049] Call Trace: [ 2189.990558][T28049] dump_stack+0x172/0x1f0 [ 2189.994935][T28049] should_fail.cold+0xa/0x15 [ 2189.999561][T28049] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2190.005415][T28049] ? ___might_sleep+0x163/0x280 [ 2190.010303][T28049] __should_failslab+0x121/0x190 [ 2190.015383][T28049] should_failslab+0x9/0x14 [ 2190.019918][T28049] kmem_cache_alloc_node_trace+0x270/0x720 [ 2190.025768][T28049] __kmalloc_node_track_caller+0x3d/0x70 [ 2190.031423][T28049] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2190.036822][T28049] __alloc_skb+0x10b/0x5e0 [ 2190.041263][T28049] ? skb_trim+0x190/0x190 [ 2190.045625][T28049] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2190.051359][T28049] ? tcp_enter_memory_pressure+0x130/0x130 [ 2190.057196][T28049] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2190.063027][T28049] sk_stream_alloc_skb+0x326/0xd80 [ 2190.068164][T28049] do_tcp_sendpages+0xafa/0x1b70 [ 2190.073143][T28049] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2190.078476][T28049] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2190.084227][T28049] tls_push_sg+0x1de/0x680 [ 2190.088682][T28049] tls_tx_records+0x3c8/0x760 [ 2190.093384][T28049] tls_push_record+0x1f67/0x3580 [ 2190.098362][T28049] ? tls_tx_records+0x760/0x760 [ 2190.103232][T28049] ? lock_downgrade+0x880/0x880 [ 2190.108120][T28049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.114383][T28049] ? kasan_check_read+0x11/0x20 [ 2190.119297][T28049] bpf_exec_tx_verdict+0xe30/0x1280 [ 2190.124623][T28049] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2190.130368][T28049] ? tls_push_record+0x3580/0x3580 [ 2190.135688][T28049] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2190.141958][T28049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.148223][T28049] ? sk_msg_alloc+0x62d/0x8d0 [ 2190.152932][T28049] tls_sw_sendmsg+0x107c/0x17b0 [ 2190.157820][T28049] ? tx_work_handler+0xf0/0xf0 [ 2190.162610][T28049] ? aa_sk_perm+0x288/0x880 [ 2190.167149][T28049] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2190.172802][T28049] inet_sendmsg+0x147/0x5e0 [ 2190.177325][T28049] ? ipip_gro_receive+0x100/0x100 [ 2190.180199][T28057] tc_dump_action: action bad kind [ 2190.182367][T28049] sock_sendmsg+0xf2/0x170 [ 2190.182388][T28049] __sys_sendto+0x262/0x380 [ 2190.182406][T28049] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2190.182426][T28049] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2190.182455][T28049] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2190.182469][T28049] ? fput_many+0x12c/0x1a0 [ 2190.182482][T28049] ? fput+0x1b/0x20 [ 2190.182495][T28049] ? ksys_write+0x1cf/0x290 [ 2190.182514][T28049] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2190.182538][T28049] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2190.237613][T28049] ? do_syscall_64+0x26/0x680 [ 2190.242416][T28049] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2190.248516][T28049] __x64_sys_sendto+0xe1/0x1a0 [ 2190.253318][T28049] do_syscall_64+0x103/0x680 [ 2190.257938][T28049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2190.263851][T28049] RIP: 0033:0x458da9 [ 2190.267760][T28049] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2190.287384][T28049] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2190.295817][T28049] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 17:20:17 executing program 5: unshare(0x3fffffd) unshare(0x24020400) r0 = socket$caif_stream(0x25, 0x1, 0x0) bind(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) 17:20:17 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8000a0ffffffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6(0xa, 0x801, 0x6) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0x4, @local, 0x823}, 0x1c) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @local, 0x0, 0x1, [@remote]}, 0x14) [ 2190.303806][T28049] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2190.311799][T28049] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2190.319790][T28049] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2190.319800][T28049] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="c3b0db5c7fb112afff5028db9e6539475e1888f91e12d2f371bdc31d010cdd421b255134a4d6c3855575ef7648e2affaa842d440107657c22e11de0c7cdff08f13a47764aab40c667fc2129bc73e5468a63ad8c9cb27e6e7741affc53736091592b7874631c2fabbdb5ace6a4ddd6ee48406be12e491045be4b4", &(0x7f0000000100)=""/64}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3c, &(0x7f0000000000), 0x20a154cc) 17:20:17 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xf0ffffffffffff, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0x3}, 0xc2) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x80000) bind(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x2, @local, 'syzkaller0\x00'}}, 0x80) [ 2190.696466][T28057] tc_dump_action: action bad kind 17:20:18 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f00000000c0)="1c0000001a009b8a14e5f407000900"/28, 0x1c) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="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") 17:20:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="980200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:18 executing program 1 (fault-call:9 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:18 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x100000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8", 0x5b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r0, &(0x7f0000000240)=0x4a, 0x8000) 17:20:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x435, @rand_addr="ed6ef744ae91a43f25e23ade0c69ec9b", 0x7}}, 0x7, 0x8001, 0xff, 0x1, 0x9}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x8) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x16, 0x6, 0xf, 0x2e8, 0x2, 0x3e, 0x8, 0x171, 0x38, 0x4d, 0xf09a, 0x6dfd, 0x20, 0x2, 0xfff, 0x7, 0x7}, [{0x1, 0x4b, 0x100000000, 0x200, 0x44, 0x9, 0x3734660c, 0x81}, {0x3, 0x78f, 0x20, 0x8, 0x4, 0x20, 0x401, 0x2}], "416062ac2051008dbca1b81fd791e6a476cb9f429c342341ce5c9500250bf26eefe6418593230ea461ff1ca2a4ee133b1367264a696c205e91362f61b6f5d4df81370a0b328e032192b40f0354bfba7fba7070010b3603e2a82bf23308f143e2b43ab393a8a840ce99b08b4f683a82eb90ac7f25326b48e20d102d47550ec27a446fe842", [[], [], []]}, 0x3fc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000005c0), 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000600), &(0x7f0000000680)=0x68) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={r2, @in6={{0xa, 0x4e24, 0x9, @empty, 0x4}}, 0x7, 0x6524}, &(0x7f0000000780)=0x90) getsockopt$rose(r0, 0x104, 0x1, &(0x7f00000007c0), &(0x7f0000000800)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000880), &(0x7f00000008c0)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000900)={r2, @in={{0x2, 0x4e20, @broadcast}}, 0x3, 0x5}, &(0x7f00000009c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000a00)={r1, 0x9, 0x3e7, 0x8000, 0x200, 0x5851}, &(0x7f0000000a40)=0x14) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000b00)={@mcast1, 0x0}, &(0x7f0000000b40)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000c40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x143}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)=@newtfilter={0x74, 0x2c, 0x20, 0x70bd2c, 0x25dfdbff, {0x0, r4, {0xfff7, 0xf}, {0xb, 0xffff}, {0xfff8, 0xfff7}}, [@TCA_CHAIN={0x8, 0xb, 0x2ce}, @TCA_RATE={0x8, 0x5, {0x100, 0x800}}, @TCA_RATE={0x8, 0x5, {0x5}}, @TCA_RATE={0x8, 0x5, {0x4, 0x100}}, @TCA_RATE={0x8, 0x5, {0x9, 0x8}}, @filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0xfff2}}]}}, @TCA_RATE={0x8, 0x5, {0xfffffffffffffffc}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x84) r5 = accept$netrom(r0, &(0x7f0000000c80)={{0x3, @null}, [@netrom, @netrom, @default, @netrom, @remote, @netrom, @remote, @default]}, &(0x7f0000000d00)=0x48) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000d40)=0x9, &(0x7f0000000d80)=0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000dc0)={r3, 0x80, 0x6, 0x1, 0x401, 0x124}, 0x14) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000e00), 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e40)=[@in6={0xa, 0x4e24, 0x5, @remote, 0x40}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x8, @local, 0xff5}, @in6={0xa, 0x4e22, 0x7, @remote, 0xea5d}, @in6={0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xc}, 0x2}, @in6={0xa, 0x4e21, 0x101, @empty, 0x1}, @in6={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000000000}], 0xb8) openat$cgroup_type(r0, &(0x7f0000000f00)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f40)={r1}, &(0x7f0000000f80)=0x8) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000fc0)={0x3}) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000001040)=@netrom={'nr', 0x0}, 0x10) r6 = openat$cgroup_ro(r0, &(0x7f0000008540)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r6, 0x114, 0x5, &(0x7f0000008580), 0x4) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000085c0)='ip6gre0\x00') sendmsg$can_bcm(r6, &(0x7f0000008700)={&(0x7f0000008600)={0x1d, r4}, 0x10, &(0x7f00000086c0)={&(0x7f0000008640)={0x3, 0x40, 0x7, {0x0, 0x7530}, {0x77359400}, {0x0, 0x75c, 0x7, 0xe}, 0x1, @can={{0x1, 0x4, 0x401, 0x7}, 0x3, 0x3, 0x0, 0x0, "4d02579ddddee825"}}, 0x48}, 0x1, 0x0, 0x0, 0x4000890}, 0x4000001) 17:20:18 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x200000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2191.224014][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2191.264033][T28103] FAULT_INJECTION: forcing a failure. 17:20:18 executing program 5: clock_gettime(0x8, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000040)='em0*\x00'}, 0x30) r1 = socket$caif_stream(0x25, 0x1, 0x4) ioctl$FICLONE(r0, 0x40049409, r1) [ 2191.264033][T28103] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.343704][T28103] CPU: 0 PID: 28103 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2191.352788][T28103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.362858][T28103] Call Trace: [ 2191.366178][T28103] dump_stack+0x172/0x1f0 [ 2191.370539][T28103] should_fail.cold+0xa/0x15 [ 2191.375153][T28103] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2191.380999][T28103] ? ___might_sleep+0x163/0x280 [ 2191.385876][T28103] __should_failslab+0x121/0x190 [ 2191.390833][T28103] should_failslab+0x9/0x14 [ 2191.395364][T28103] __kmalloc+0x2dc/0x740 [ 2191.399650][T28103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2191.405922][T28103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.412177][T28103] ? tls_get_rec+0x104/0x590 [ 2191.416784][T28103] tls_get_rec+0x104/0x590 [ 2191.421227][T28103] tls_sw_sendmsg+0xda5/0x17b0 [ 2191.426020][T28103] ? tx_work_handler+0xf0/0xf0 [ 2191.430796][T28103] ? aa_sk_perm+0x288/0x880 [ 2191.435329][T28103] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2191.440898][T28103] inet_sendmsg+0x147/0x5e0 [ 2191.445429][T28103] ? ipip_gro_receive+0x100/0x100 [ 2191.450740][T28103] sock_sendmsg+0xf2/0x170 [ 2191.455186][T28103] __sys_sendto+0x262/0x380 [ 2191.459722][T28103] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2191.465127][T28103] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2191.470714][T28103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2191.476972][T28103] ? fput_many+0x12c/0x1a0 [ 2191.482100][T28103] ? fput+0x1b/0x20 [ 2191.485925][T28103] ? ksys_write+0x1cf/0x290 [ 2191.490453][T28103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2191.495932][T28103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2191.501419][T28103] ? do_syscall_64+0x26/0x680 [ 2191.506150][T28103] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2191.512248][T28103] __x64_sys_sendto+0xe1/0x1a0 [ 2191.517041][T28103] do_syscall_64+0x103/0x680 [ 2191.521669][T28103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2191.527589][T28103] RIP: 0033:0x458da9 [ 2191.531518][T28103] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2191.551226][T28103] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2191.559665][T28103] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2191.567919][T28103] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2191.575917][T28103] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2191.583909][T28103] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:20:18 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x300000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2191.591910][T28103] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:18 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000400)=@req={0x6, 0x100, 0x7, 0x2}, 0xffffffffffffff66) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001500)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x10001}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x100000000, 0x2, 0x8, 0x8, 0x7fffffff, 0x163, 0x0, 0x5, r3}, &(0x7f0000000300)=0x20) sendmsg$nfc_llcp(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x27, 0x0, 0x1, 0x7, 0x6, 0x7fffffff, "99e0a5379e1e0a220948b1a193178494a79842c05862cb418f786dbe89fcadaffb3783400d01765480395c6bf0878e415de203db547e6d9bd436f8fb0d1b81", 0xd}, 0x60, &(0x7f0000000100)=[{&(0x7f00000000c0)="744c7b83f34f4972261a0f9c7e93cf6b935debcc3a40cab89ecb2e25590412c5d595ca37653e5698588f895bc55d69078695e402cf93a70b09e8a93fcb946487", 0x40}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="9800000000000000170100008c0e00006ed318ddf31af74356827ccff5e01dbae1d5ebcd0d8c8988ae95b3809ab39162b4f238527e941cca5b4e11904bfc20f597b0b4aa03e1df7f7c93885bfa33999c89d309b097e153ddbc85cc7a6cf263b0a0e1c005a5bf2205a889dec3d2c661e2ee99fd6aa7037da8185c487eb38e2c752ea7450a6351ebbe4d99d5c5e761a1040a98343c60c60000d2eb9a600c55a92ec57ca96eaf82647f7e3f57294203dd9c8df6d8bff5c9a5"], 0x98, 0x800}, 0x80) 17:20:18 executing program 1 (fault-call:9 fault-nth:64): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x400000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2191.802071][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2191.832486][T28124] FAULT_INJECTION: forcing a failure. [ 2191.832486][T28124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2191.855145][T28124] CPU: 0 PID: 28124 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2191.862822][T28124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.862830][T28124] Call Trace: [ 2191.862859][T28124] dump_stack+0x172/0x1f0 [ 2191.862883][T28124] should_fail.cold+0xa/0x15 [ 2191.862902][T28124] ? __sys_sendto+0x262/0x380 [ 2191.862923][T28124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2191.862953][T28124] should_fail_alloc_page+0x50/0x60 [ 2191.862971][T28124] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2191.862989][T28124] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2191.863008][T28124] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2191.863024][T28124] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2191.863052][T28124] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2191.863078][T28124] alloc_pages_current+0x107/0x210 [ 2191.885564][T28124] skb_page_frag_refill+0x277/0x460 [ 2191.940312][T28124] sk_page_frag_refill+0x55/0x1f0 [ 2191.945370][T28124] sk_msg_alloc+0x10e/0x8d0 [ 2191.949915][T28124] tls_sw_sendmsg+0x63c/0x17b0 17:20:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x500000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2191.954727][T28124] ? tx_work_handler+0xf0/0xf0 [ 2191.959607][T28124] ? aa_sk_perm+0x288/0x880 [ 2191.964151][T28124] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2191.969726][T28124] inet_sendmsg+0x147/0x5e0 [ 2191.974260][T28124] ? ipip_gro_receive+0x100/0x100 [ 2191.979318][T28124] sock_sendmsg+0xf2/0x170 [ 2191.983757][T28124] __sys_sendto+0x262/0x380 [ 2191.983776][T28124] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2191.983796][T28124] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2191.983825][T28124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2191.993782][T28124] ? fput_many+0x12c/0x1a0 [ 2191.993796][T28124] ? fput+0x1b/0x20 [ 2191.993807][T28124] ? ksys_write+0x1cf/0x290 [ 2191.993824][T28124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2191.993838][T28124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2191.993852][T28124] ? do_syscall_64+0x26/0x680 [ 2191.993868][T28124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2191.993889][T28124] __x64_sys_sendto+0xe1/0x1a0 [ 2191.993916][T28124] do_syscall_64+0x103/0x680 [ 2192.049752][T28124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2192.055665][T28124] RIP: 0033:0x458da9 [ 2192.059669][T28124] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2192.079391][T28124] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2192.087825][T28124] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2192.095816][T28124] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2192.103809][T28124] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2192.111799][T28124] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2192.119820][T28124] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="990200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x3, 0x7, 0x4, 0x110, 0x1, 0xbad, [], 0x0, 0xffffffffffffff9c}, 0x3c) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001100)={r0, &(0x7f0000000080)="6201edfde9149ca3270de62141b89f451e7dec09abb91b0b0021ea31ace18c430f1c8204f7b2efe6b01e535cf7c837f90f0dda39c0ccb726da938c577294ad06d82ef7976a58bbca7bbc18ad8c6b51bae442183d53611015f9eb6d82777c41f966d020ed9dc548b2775f7959451e21b9b8f6cdb4549ea9e553d9b59573", &(0x7f0000000100)=""/4096}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 17:20:19 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000400)=@req={0x6, 0x100, 0x7, 0x2}, 0xffffffffffffff66) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001500)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x10001}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x100000000, 0x2, 0x8, 0x8, 0x7fffffff, 0x163, 0x0, 0x5, r3}, &(0x7f0000000300)=0x20) sendmsg$nfc_llcp(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x27, 0x0, 0x1, 0x7, 0x6, 0x7fffffff, "99e0a5379e1e0a220948b1a193178494a79842c05862cb418f786dbe89fcadaffb3783400d01765480395c6bf0878e415de203db547e6d9bd436f8fb0d1b81", 0xd}, 0x60, &(0x7f0000000100)=[{&(0x7f00000000c0)="744c7b83f34f4972261a0f9c7e93cf6b935debcc3a40cab89ecb2e25590412c5d595ca37653e5698588f895bc55d69078695e402cf93a70b09e8a93fcb946487", 0x40}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="9800000000000000170100008c0e00006ed318ddf31af74356827ccff5e01dbae1d5ebcd0d8c8988ae95b3809ab39162b4f238527e941cca5b4e11904bfc20f597b0b4aa03e1df7f7c93885bfa33999c89d309b097e153ddbc85cc7a6cf263b0a0e1c005a5bf2205a889dec3d2c661e2ee99fd6aa7037da8185c487eb38e2c752ea7450a6351ebbe4d99d5c5e761a1040a98343c60c60000d2eb9a600c55a92ec57ca96eaf82647f7e3f57294203dd9c8df6d8bff5c9a5"], 0x98, 0x800}, 0x80) 17:20:19 executing program 4: r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000380)=r1, 0x4) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000200)=[{r2, 0xd140}], 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f0000000280)={0x4}, 0x8) ioctl$FICLONE(r1, 0x40049409, r0) r3 = socket(0x1c, 0x809, 0xfffffffffffffab8) setsockopt(r0, 0x8c30, 0x4, &(0x7f0000000440)="135f491465065bf8240940269c8121063b25ee693d9e4f1a3bad222ccf40611f3ec3627793ca794ebb55c91ae1feaffc3f718479631511c1d8fb509129c2d832924f85e2225a63c87beae702468a1d4cfdcde43d976ad08e47fe017f16565b9696eb5de580a55a9f66fe", 0x6a) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x800, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}]}, 0x24}}, 0x4000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x3}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000400)={r5, 0x3}, 0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000300)=0x6, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x18, 0x34, 0x829, 0x0, 0x0, {0x4, 0x40000}, [@nested={0x4}]}, 0x18}}, 0x40080) 17:20:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x600000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:19 executing program 1 (fault-call:9 fault-nth:65): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2192.591946][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2192.623314][T28147] FAULT_INJECTION: forcing a failure. [ 2192.623314][T28147] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.652679][T28147] CPU: 1 PID: 28147 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2192.660274][T28147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2192.670343][T28147] Call Trace: [ 2192.673664][T28147] dump_stack+0x172/0x1f0 [ 2192.678035][T28147] should_fail.cold+0xa/0x15 [ 2192.678066][T28147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2192.688467][T28147] ? ___might_sleep+0x163/0x280 [ 2192.688490][T28147] __should_failslab+0x121/0x190 [ 2192.688507][T28147] should_failslab+0x9/0x14 [ 2192.688534][T28147] __kmalloc+0x2dc/0x740 [ 2192.707081][T28147] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2192.713381][T28147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.719640][T28147] ? tls_get_rec+0x104/0x590 [ 2192.724248][T28147] tls_get_rec+0x104/0x590 [ 2192.728684][T28147] tls_sw_sendmsg+0xda5/0x17b0 [ 2192.733481][T28147] ? tx_work_handler+0xf0/0xf0 [ 2192.738260][T28147] ? aa_sk_perm+0x288/0x880 [ 2192.742780][T28147] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2192.748345][T28147] inet_sendmsg+0x147/0x5e0 [ 2192.752859][T28147] ? ipip_gro_receive+0x100/0x100 [ 2192.757894][T28147] sock_sendmsg+0xf2/0x170 [ 2192.762321][T28147] __sys_sendto+0x262/0x380 [ 2192.766834][T28147] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2192.772222][T28147] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2192.777811][T28147] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2192.784249][T28147] ? fput_many+0x12c/0x1a0 [ 2192.784263][T28147] ? fput+0x1b/0x20 [ 2192.784275][T28147] ? ksys_write+0x1cf/0x290 [ 2192.784300][T28147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2192.802577][T28147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2192.808061][T28147] ? do_syscall_64+0x26/0x680 [ 2192.812756][T28147] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2192.818843][T28147] __x64_sys_sendto+0xe1/0x1a0 [ 2192.823635][T28147] do_syscall_64+0x103/0x680 [ 2192.828246][T28147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2192.834154][T28147] RIP: 0033:0x458da9 17:20:19 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x700000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:20 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x800000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:20 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x806000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2192.838056][T28147] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2192.857702][T28147] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2192.866479][T28147] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2192.874558][T28147] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2192.882548][T28147] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2192.882557][T28147] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:20:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket(0x1, 0x801, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000008ac0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000008b80)={&(0x7f0000008a80), 0xc, &(0x7f0000008b40)={&(0x7f0000000100)={0x2c, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x8040) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) r4 = socket(0x0, 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket(0x19, 0x1, 0x2) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000200)=0xfffffffffffffebb) write$binfmt_script(r0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f00000000c0)={0x0, @local}) write$binfmt_elf64(r0, &(0x7f0000000b40)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b4, 0xb1, 0x0, 0x38, 0x1, 0x0, 0x20, 0x1}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) [ 2192.882565][T28147] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000064c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r2 = accept(r0, &(0x7f0000001500)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000001580)=0x80) accept4$vsock_stream(r2, &(0x7f00000015c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) recvfrom$inet(r0, &(0x7f0000000140)=""/223, 0xdf, 0x10000, &(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0xb, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) 17:20:20 executing program 1 (fault-call:9 fault-nth:66): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) [ 2193.113341][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2193.131886][T28172] FAULT_INJECTION: forcing a failure. [ 2193.131886][T28172] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.153713][T28172] CPU: 1 PID: 28172 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2193.161303][T28172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2193.171373][T28172] Call Trace: [ 2193.174788][T28172] dump_stack+0x172/0x1f0 [ 2193.179155][T28172] should_fail.cold+0xa/0x15 [ 2193.183953][T28172] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2193.189786][T28172] ? ___might_sleep+0x163/0x280 [ 2193.194659][T28172] __should_failslab+0x121/0x190 [ 2193.199633][T28172] should_failslab+0x9/0x14 [ 2193.204162][T28172] kmem_cache_alloc_node+0x264/0x710 [ 2193.209484][T28172] __alloc_skb+0xd5/0x5e0 [ 2193.213838][T28172] ? skb_trim+0x190/0x190 [ 2193.218186][T28172] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2193.223931][T28172] ? tcp_enter_memory_pressure+0x130/0x130 [ 2193.229767][T28172] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2193.235609][T28172] sk_stream_alloc_skb+0x326/0xd80 [ 2193.240753][T28172] do_tcp_sendpages+0xafa/0x1b70 [ 2193.245813][T28172] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2193.251185][T28172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2193.257040][T28172] tls_push_sg+0x1de/0x680 [ 2193.257064][T28172] tls_tx_records+0x3c8/0x760 [ 2193.257082][T28172] tls_push_record+0x1f67/0x3580 [ 2193.257111][T28172] ? tls_tx_records+0x760/0x760 [ 2193.257133][T28172] ? lock_downgrade+0x880/0x880 [ 2193.280952][T28172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2193.287252][T28172] ? kasan_check_read+0x11/0x20 [ 2193.292152][T28172] bpf_exec_tx_verdict+0xe30/0x1280 [ 2193.297403][T28172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2193.303146][T28172] ? tls_push_record+0x3580/0x3580 [ 2193.308383][T28172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2193.314646][T28172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2193.320900][T28172] ? sk_msg_alloc+0x62d/0x8d0 [ 2193.325611][T28172] tls_sw_sendmsg+0x107c/0x17b0 [ 2193.330497][T28172] ? tx_work_handler+0xf0/0xf0 [ 2193.335278][T28172] ? aa_sk_perm+0x288/0x880 [ 2193.339805][T28172] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2193.345364][T28172] inet_sendmsg+0x147/0x5e0 [ 2193.345379][T28172] ? ipip_gro_receive+0x100/0x100 [ 2193.345405][T28172] sock_sendmsg+0xf2/0x170 [ 2193.357445][T28172] __sys_sendto+0x262/0x380 [ 2193.357467][T28172] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2193.357488][T28172] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2193.357516][T28172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2193.383652][T28172] ? fput_many+0x12c/0x1a0 [ 2193.388086][T28172] ? fput+0x1b/0x20 [ 2193.391912][T28172] ? ksys_write+0x1cf/0x290 [ 2193.396437][T28172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2193.401920][T28172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2193.407398][T28172] ? do_syscall_64+0x26/0x680 [ 2193.412104][T28172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2193.418392][T28172] __x64_sys_sendto+0xe1/0x1a0 [ 2193.423181][T28172] do_syscall_64+0x103/0x680 [ 2193.427794][T28172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2193.433701][T28172] RIP: 0033:0x458da9 [ 2193.437620][T28172] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2193.457588][T28172] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2193.466034][T28172] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2193.474030][T28172] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2193.483502][T28172] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2193.491505][T28172] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2193.499499][T28172] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="9a0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:21 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0xd00000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:21 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/222, 0xde}, {&(0x7f00000001c0)=""/251, 0xfb}, {&(0x7f00000002c0)=""/237, 0xed}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001400)=""/70, 0x46}, 0x1}, {{&(0x7f0000001480)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001500)=""/249, 0xf9}], 0x1, &(0x7f0000001640)=""/211, 0xd3}, 0x2}, {{&(0x7f0000001740)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000017c0)=""/242, 0xf2}, {&(0x7f00000018c0)=""/241, 0xf1}], 0x2}, 0x401}], 0x3, 0x2, &(0x7f0000001b00)={r1, r2+30000000}) 17:20:21 executing program 1 (fault-call:9 fault-nth:67): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) accept$unix(r1, &(0x7f0000000140), &(0x7f00000000c0)=0x6e) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000004e80)={0x0, 0x0, &(0x7f0000000000), 0x5, 0x0, 0xfffffffffffffedc}, 0x3) 17:20:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000100)="0a0224333ff070") r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xbbf}, &(0x7f00000000c0)=0xc) syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000140)={r2, 0x1f, 0xbc, "ccd78b49b899a5e3393fe5099b6369c7e71668ee8ae4c9b0cb61df6cd65cf99c3c9752d5fee5b82edb578cb168b78fa67123b8bae2c7b158916b6c8f2bbfbe73b383e5e3f1df17d0ecd922e631c59a2a763ba89a03bdbb6d38df95a06ee2a6fba7897eec4b2c0487a0019caea4316c2a57ff98634f975b62fb3a8b0d51ab353718d5c07147bfcee1b9fbb78dc103c8270034f15036ebd2b8701544ede3860e0529c9c48155f26a7b0a544b26118c89aef2c55ec2296141f429fba53e"}, 0xc4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x11, 0x4, 0x4, 0x1}, 0x3c) [ 2194.734310][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2194.753961][T28216] FAULT_INJECTION: forcing a failure. [ 2194.753961][T28216] name failslab, interval 1, probability 0, space 0, times 0 17:20:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000080)=@dstopts={0x0, 0x2, [], [@jumbo={0xc2, 0x4, 0x6}, @ra={0x5, 0x2, 0x9}, @jumbo={0xc2, 0x4, 0x1}]}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x38f, 0x0, 0xffffffffffffff9b}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 2194.780462][T28216] CPU: 0 PID: 28216 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2194.788054][T28216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2194.788063][T28216] Call Trace: [ 2194.788088][T28216] dump_stack+0x172/0x1f0 [ 2194.788113][T28216] should_fail.cold+0xa/0x15 [ 2194.788135][T28216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2194.788166][T28216] ? ___might_sleep+0x163/0x280 [ 2194.821094][T28216] __should_failslab+0x121/0x190 [ 2194.826061][T28216] should_failslab+0x9/0x14 [ 2194.830582][T28216] kmem_cache_alloc_node_trace+0x270/0x720 [ 2194.836497][T28216] __kmalloc_node_track_caller+0x3d/0x70 [ 2194.842168][T28216] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2194.847661][T28216] __alloc_skb+0x10b/0x5e0 [ 2194.852107][T28216] ? skb_trim+0x190/0x190 [ 2194.856461][T28216] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2194.862202][T28216] ? tcp_enter_memory_pressure+0x130/0x130 [ 2194.868025][T28216] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2194.873849][T28216] sk_stream_alloc_skb+0x326/0xd80 [ 2194.879081][T28216] do_tcp_sendpages+0xafa/0x1b70 [ 2194.884054][T28216] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2194.889357][T28216] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2194.895090][T28216] tls_push_sg+0x1de/0x680 [ 2194.899525][T28216] tls_tx_records+0x3c8/0x760 [ 2194.904214][T28216] tls_push_record+0x1f67/0x3580 [ 2194.909179][T28216] ? tls_tx_records+0x760/0x760 [ 2194.914043][T28216] ? lock_downgrade+0x880/0x880 [ 2194.918905][T28216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.925162][T28216] ? kasan_check_read+0x11/0x20 [ 2194.930215][T28216] bpf_exec_tx_verdict+0xe30/0x1280 [ 2194.935629][T28216] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2194.941364][T28216] ? tls_push_record+0x3580/0x3580 [ 2194.946566][T28216] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2194.952837][T28216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.959110][T28216] ? sk_msg_alloc+0x62d/0x8d0 [ 2194.963815][T28216] tls_sw_sendmsg+0x107c/0x17b0 [ 2194.968700][T28216] ? tx_work_handler+0xf0/0xf0 [ 2194.973473][T28216] ? aa_sk_perm+0x288/0x880 [ 2194.977994][T28216] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2194.983555][T28216] inet_sendmsg+0x147/0x5e0 [ 2194.988255][T28216] ? ipip_gro_receive+0x100/0x100 [ 2194.993298][T28216] sock_sendmsg+0xf2/0x170 [ 2194.997729][T28216] __sys_sendto+0x262/0x380 [ 2195.002247][T28216] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2195.007655][T28216] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2195.013254][T28216] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2195.019512][T28216] ? fput_many+0x12c/0x1a0 [ 2195.023947][T28216] ? fput+0x1b/0x20 [ 2195.028027][T28216] ? ksys_write+0x1cf/0x290 [ 2195.032546][T28216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2195.038023][T28216] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2195.043493][T28216] ? do_syscall_64+0x26/0x680 [ 2195.048178][T28216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2195.054282][T28216] __x64_sys_sendto+0xe1/0x1a0 [ 2195.059060][T28216] do_syscall_64+0x103/0x680 [ 2195.063665][T28216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2195.069563][T28216] RIP: 0033:0x458da9 [ 2195.073476][T28216] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2195.093095][T28216] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2195.101697][T28216] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2195.109679][T28216] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2195.117660][T28216] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2195.125641][T28216] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:20:22 executing program 5: r0 = socket$inet6(0xa, 0x40000000000005, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote, 0x1}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3405000000000000]}, 0x7}, 0x1c) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 2195.133630][T28216] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:22 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x2800000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000340)="0adc08123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) shutdown(r1, 0x1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "215e23b6a14a937e", "df28196f6317ffbc13846cbe59f4f1b8c255c35c6b898da733494d6ae33cbdfb", "7b45bfdf", "1215ddea89823d54"}, 0x38) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c}, 0x1c}}, 0x4000) sendto$inet6(r1, &(0x7f0000000180)='Y', 0x1, 0x4000, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000140), 0x4) close(r1) socket$netlink(0x10, 0x3, 0x0) 17:20:22 executing program 1 (fault-call:9 fault-nth:68): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:22 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x3f00000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2195.518729][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2195.551300][T28246] FAULT_INJECTION: forcing a failure. [ 2195.551300][T28246] name failslab, interval 1, probability 0, space 0, times 0 [ 2195.578922][T28246] CPU: 0 PID: 28246 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2195.586524][T28246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2195.596620][T28246] Call Trace: [ 2195.599971][T28246] dump_stack+0x172/0x1f0 [ 2195.604330][T28246] should_fail.cold+0xa/0x15 [ 2195.608941][T28246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2195.614768][T28246] ? ___might_sleep+0x163/0x280 [ 2195.619650][T28246] __should_failslab+0x121/0x190 [ 2195.624614][T28246] should_failslab+0x9/0x14 [ 2195.629139][T28246] __kmalloc+0x2dc/0x740 [ 2195.633663][T28246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2195.639917][T28246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.646165][T28246] ? tls_get_rec+0x104/0x590 [ 2195.650777][T28246] tls_get_rec+0x104/0x590 [ 2195.655215][T28246] tls_sw_sendmsg+0xda5/0x17b0 [ 2195.660014][T28246] ? tx_work_handler+0xf0/0xf0 [ 2195.664800][T28246] ? aa_sk_perm+0x288/0x880 [ 2195.669332][T28246] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2195.674904][T28246] inet_sendmsg+0x147/0x5e0 [ 2195.679432][T28246] ? ipip_gro_receive+0x100/0x100 [ 2195.684484][T28246] sock_sendmsg+0xf2/0x170 [ 2195.688927][T28246] __sys_sendto+0x262/0x380 [ 2195.693550][T28246] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2195.698946][T28246] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2195.704529][T28246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2195.710890][T28246] ? fput_many+0x12c/0x1a0 [ 2195.715325][T28246] ? fput+0x1b/0x20 [ 2195.719235][T28246] ? ksys_write+0x1cf/0x290 [ 2195.723759][T28246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2195.729234][T28246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2195.734703][T28246] ? do_syscall_64+0x26/0x680 [ 2195.734721][T28246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2195.734744][T28246] __x64_sys_sendto+0xe1/0x1a0 [ 2195.734764][T28246] do_syscall_64+0x103/0x680 [ 2195.745497][T28246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2195.745508][T28246] RIP: 0033:0x458da9 [ 2195.745522][T28246] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2195.745530][T28246] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2195.745544][T28246] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2195.745552][T28246] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2195.745559][T28246] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2195.745567][T28246] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2195.745576][T28246] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="9b0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4000000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:23 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa1480c289000086dd6076605100302100fe80044300050d0000000000000000ffff02002e2ac3e9646fa287b58700000000000000000000a7f9f5525acadbf9c786c48901f992000001860090780007000060c5965e00000000ff010000000000001803000005000001ff"], 0x0) 17:20:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x17a, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x7000, 0x20}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000500)={r3, 0x1886}, &(0x7f0000000540)=0x8) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) 17:20:23 executing program 1 (fault-call:9 fault-nth:69): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000001980)=[{{&(0x7f0000000100)=@nl, 0x80, 0x0}}, {{&(0x7f0000001640)=@nl, 0x80, 0x0}}], 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:20:23 executing program 5: r0 = socket$inet(0x2, 0x5000000000000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000a40000)={0x2, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r0}) connect$x25(r1, &(0x7f0000000180)={0x9, @remote={[], 0x0}}, 0x12) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1, @in6=@empty}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) close(r0) 17:20:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x4305000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2196.209763][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2196.275012][T28267] FAULT_INJECTION: forcing a failure. [ 2196.275012][T28267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2196.322395][T28267] CPU: 0 PID: 28267 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2196.329994][T28267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2196.340075][T28267] Call Trace: [ 2196.343404][T28267] dump_stack+0x172/0x1f0 [ 2196.348312][T28267] should_fail.cold+0xa/0x15 [ 2196.353013][T28267] ? __sys_sendto+0x262/0x380 [ 2196.357711][T28267] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2196.363646][T28267] should_fail_alloc_page+0x50/0x60 17:20:23 executing program 5: r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000cc0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000000)=0xffffffffffffff01, 0x4) gettid() r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0x1f, &(0x7f0000000280)="86025c556b25046c6a92973c3ca3f93e19c182413459753d7857fe208d8af43add44de7bfff8ec54a57168a4dbf6ae2852407f70e4d58bf9fc47f7d3d8bb417c4c8b0ddadcfb015e00d9574e9a43c7be25d2a509a8b06ab1bb0626958c9f18c3093e1226e96f950f0b7fea1b15bbb492b0f32d01a0abec83fe29c9747592241c090c4f048b773b4e778765004b861e796276cd9e7d580332dce8c0c79f0ab1e611c25da437", 0xa5) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote, @loopback, @local, 0x4, 0x78, 0x0, 0x100, 0x1}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000004c0)={0x2, 0x4e26, @empty}, 0xfffffe68) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x4, &(0x7f0000000d40)="0adc1f123c123f3788b070") socket(0x400000000010, 0x80801, 0x100000000) recvmmsg(r2, &(0x7f0000002100)=[{{&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000400)=""/47, 0x2f}, {&(0x7f0000000440)=""/18, 0x12}], 0x3, &(0x7f00000006c0)=""/104, 0x68}, 0x10000}, {{&(0x7f00000007c0)=@l2, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000840)=""/155, 0x9b}, {&(0x7f0000000900)=""/153, 0x99}, {&(0x7f00000009c0)=""/94, 0x5e}], 0x3, &(0x7f0000000a80)=""/14, 0xe}, 0x3}, {{&(0x7f0000000ac0)=@ipx, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000b40)=""/95, 0x5f}, {&(0x7f0000000bc0)=""/212, 0xd4}, {&(0x7f0000002300)=""/248, 0xf8}, {&(0x7f0000000dc0)=""/26, 0x1a}, {&(0x7f0000000e00)=""/57, 0x39}, {&(0x7f0000000e40)=""/13, 0xd}, {&(0x7f0000000e80)=""/177, 0xb1}], 0x7, &(0x7f0000000fc0)=""/170, 0xaa}, 0x539f00000}, {{&(0x7f0000001080)=@pppol2tpin6, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001200)=""/159, 0x9f}, {&(0x7f00000012c0)=""/103, 0x67}, {&(0x7f0000001340)=""/155, 0x9b}, {&(0x7f0000001400)=""/153, 0x99}, {&(0x7f00000014c0)=""/67, 0x43}, {&(0x7f0000001540)=""/93, 0x5d}], 0x7}, 0x88d}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/237, 0xed}, {&(0x7f0000001640)=""/5, 0x5}, {&(0x7f0000001900)=""/183, 0xb7}], 0x4, &(0x7f00000019c0)=""/141, 0x8d}, 0x3}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001b00)=""/231, 0xe7}, {&(0x7f0000002400)=""/64, 0x40}, {&(0x7f0000001c40)=""/106, 0x6a}, {&(0x7f0000001cc0)=""/37, 0x25}, {&(0x7f0000001d00)=""/227, 0xe3}, {&(0x7f0000001e00)=""/17, 0x11}, {&(0x7f0000001e40)=""/45, 0x2d}, {&(0x7f0000002440)=""/211, 0xd3}], 0x8, &(0x7f0000002000)=""/195, 0xc3}, 0x10001}], 0x6, 0x2020, &(0x7f0000002280)={0x0, 0x1c9c380}) write(r3, &(0x7f0000000000)="2400000021002551075c0165ff0ffc020200000000100f0207e1000c0800100000000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb7904", 0xe0) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x1ff, 0x6, 0x4, 0x8}, &(0x7f00000005c0)=0x98) connect$l2tp(r2, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x2, 0x1}}, 0xfffffffffffffdb5) r4 = socket$inet(0x2, 0x3ffffffffffffffe, 0x0) bind$inet(r0, &(0x7f0000000d00)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @broadcast}, 0x10) write$binfmt_elf64(r4, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, 0x0, 0x40e9f579703ac2f6) [ 2196.368861][T28267] __alloc_pages_nodemask+0x1a1/0x8d0 [ 2196.374247][T28267] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2196.379904][T28267] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2196.385650][T28267] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2196.391314][T28267] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2196.397570][T28267] alloc_pages_current+0x107/0x210 [ 2196.397601][T28267] skb_page_frag_refill+0x277/0x460 [ 2196.397625][T28267] sk_page_frag_refill+0x55/0x1f0 [ 2196.397642][T28267] sk_msg_alloc+0x10e/0x8d0 [ 2196.397666][T28267] tls_sw_sendmsg+0x63c/0x17b0 [ 2196.397698][T28267] ? tx_work_handler+0xf0/0xf0 [ 2196.397714][T28267] ? aa_sk_perm+0x288/0x880 [ 2196.397734][T28267] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2196.437259][T28267] inet_sendmsg+0x147/0x5e0 [ 2196.441783][T28267] ? ipip_gro_receive+0x100/0x100 [ 2196.446825][T28267] sock_sendmsg+0xf2/0x170 [ 2196.451264][T28267] __sys_sendto+0x262/0x380 [ 2196.455787][T28267] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2196.461175][T28267] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2196.466756][T28267] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 17:20:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x88) socket$nl_crypto(0x10, 0x3, 0x15) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 2196.473012][T28267] ? fput_many+0x12c/0x1a0 [ 2196.477446][T28267] ? fput+0x1b/0x20 [ 2196.481270][T28267] ? ksys_write+0x1cf/0x290 [ 2196.485787][T28267] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2196.491272][T28267] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2196.496755][T28267] ? do_syscall_64+0x26/0x680 [ 2196.501451][T28267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2196.507553][T28267] __x64_sys_sendto+0xe1/0x1a0 [ 2196.512337][T28267] do_syscall_64+0x103/0x680 [ 2196.512359][T28267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2196.512370][T28267] RIP: 0033:0x458da9 [ 2196.512385][T28267] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2196.512392][T28267] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2196.512406][T28267] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2196.512414][T28267] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 17:20:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x5800000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2196.512422][T28267] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2196.512430][T28267] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2196.512439][T28267] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x800e000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2196.762437][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2196.768457][ C0] protocol 88fb is buggy, dev hsr_slave_1 17:20:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="9c0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:24 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff0180c200000008004500001c00000047d317d05393290200ac14140000009078ac1414bb"], 0x0) 17:20:24 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8035000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:24 executing program 1 (fault-call:9 fault-nth:70): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000100), 0x4) socket$inet6(0xa, 0x3, 0x800000000000004) r1 = socket$inet6(0xa, 0x3, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'veth1_to_hsr\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}}) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'bond_slave_0\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x38}}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x100000000011, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000040)="ca", &(0x7f0000000240)}, 0x20) 17:20:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="853dac0000002200000007000000000000009500000000000000"], &(0x7f0000014ff5)='GPL\x00', 0x3, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x42, 0x0, &(0x7f00000001c0)="e460cdfbef24080000000a9386dd6a00000000072feb30751ee5c53ce700e800000000010000001400000500242f09880bd320d99a61a900655844d8d51da23e115a", 0x0}, 0x28) [ 2197.584441][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2197.614075][T28309] FAULT_INJECTION: forcing a failure. [ 2197.614075][T28309] name failslab, interval 1, probability 0, space 0, times 0 17:20:24 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8100000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2197.636002][T28309] CPU: 1 PID: 28309 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2197.643605][T28309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2197.653681][T28309] Call Trace: [ 2197.656996][T28309] dump_stack+0x172/0x1f0 [ 2197.661344][T28309] should_fail.cold+0xa/0x15 [ 2197.665946][T28309] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2197.671858][T28309] ? ___might_sleep+0x163/0x280 [ 2197.676722][T28309] __should_failslab+0x121/0x190 [ 2197.681678][T28309] should_failslab+0x9/0x14 [ 2197.686191][T28309] __kmalloc+0x2dc/0x740 [ 2197.690443][T28309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2197.696711][T28309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.702957][T28309] ? tls_get_rec+0x104/0x590 [ 2197.707555][T28309] tls_get_rec+0x104/0x590 [ 2197.711992][T28309] tls_sw_sendmsg+0xda5/0x17b0 [ 2197.716780][T28309] ? tx_work_handler+0xf0/0xf0 [ 2197.721545][T28309] ? aa_sk_perm+0x288/0x880 [ 2197.726064][T28309] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2197.731655][T28309] inet_sendmsg+0x147/0x5e0 [ 2197.736187][T28309] ? ipip_gro_receive+0x100/0x100 [ 2197.741223][T28309] sock_sendmsg+0xf2/0x170 [ 2197.745657][T28309] __sys_sendto+0x262/0x380 [ 2197.750183][T28309] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2197.755569][T28309] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2197.761143][T28309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2197.767390][T28309] ? fput_many+0x12c/0x1a0 [ 2197.771806][T28309] ? fput+0x1b/0x20 [ 2197.775623][T28309] ? ksys_write+0x1cf/0x290 [ 2197.780142][T28309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2197.785615][T28309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2197.791085][T28309] ? do_syscall_64+0x26/0x680 [ 2197.795783][T28309] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2197.801864][T28309] __x64_sys_sendto+0xe1/0x1a0 [ 2197.806647][T28309] do_syscall_64+0x103/0x680 [ 2197.811249][T28309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2197.817143][T28309] RIP: 0033:0x458da9 [ 2197.821037][T28309] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2197.840740][T28309] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2197.849249][T28309] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2197.857219][T28309] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2197.865207][T28309] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2197.873183][T28309] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 17:20:25 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008914, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) socket$inet6(0xa, 0x0, 0x6) socket$inet6(0xa, 0x80001, 0x0) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000280)=""/158, 0x9e, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r2 = socket$nl_crypto(0x10, 0x3, 0x15) getpeername$netlink(r2, &(0x7f0000000f80), &(0x7f0000000fc0)=0xc) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x80004004801) syz_emit_ethernet(0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) unshare(0x40000000) r3 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x10ab, 0x7, 0xfffffffffffffd92}, 0x8) r4 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r4, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="5a00004000002547d6bb150b000000004af7dd8804e0bba737a484ee511d2b3a4c38001c38f0dd9c10fda49e4e3516aae05b23a65547d5fa28273102453723047fdb361b62105ca173cd2b5c40dcd7b60055803de65b59de97c2c64074fe82be775b00"/117]}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000003c0)={{0x8, 0x9, 0x0, 0x3f, 0x81, 0x5}, 0xd95, 0x100, 0x81, 0x200, 0x8001, "a9f88f7f17a06cb8da06d6cb10075aa8d0dc5a58e9dc589b491aa08aca78141710525a8f8826bbb285a837a1c2b931d312ccbcf551909142fd946631878bbcd16d6144bde0b41a3195b8afa7300af4e3fc5a8c15c439f11ed43568d674cafbc9d3e22ccd19efe0ff1fdca6e9a6dbc1c8807d8bdaa52727934ee3955f5f4d915d"}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000200)=0x54) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, 0x0) poll(&(0x7f0000000040)=[{}], 0x20000000000000e6, 0x0) [ 2197.881156][T28309] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2197.889459][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.895306][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2197.901185][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.907063][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:20:25 executing program 1 (fault-call:9 fault-nth:71): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:25 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x86ddffff00000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x100000000014, 0x4, 0x4, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0)="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", &(0x7f0000000180)=""/234}, 0xe2a5be33b373f270) 17:20:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @rand_addr="01b5ef85910252e6c4efa9bca4e63135"}, {0xa, 0x0, 0x0, @rand_addr="d9ae84d566afd5258cac14436b02c484", 0xfff}, 0x0, [0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x10006]}, 0x5c) sendmsg$key(r2, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x2a}, 0x2}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) [ 2198.145576][T28330] IPVS: ftp: loaded support on port[0] = 21 [ 2198.278758][T28333] FAULT_INJECTION: forcing a failure. [ 2198.278758][T28333] name failslab, interval 1, probability 0, space 0, times 0 [ 2198.323689][T28333] CPU: 0 PID: 28333 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2198.331278][T28333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2198.331294][T28333] Call Trace: [ 2198.344675][T28333] dump_stack+0x172/0x1f0 [ 2198.349507][T28333] should_fail.cold+0xa/0x15 [ 2198.354155][T28333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2198.359986][T28333] ? ___might_sleep+0x163/0x280 [ 2198.364865][T28333] __should_failslab+0x121/0x190 [ 2198.369816][T28333] should_failslab+0x9/0x14 [ 2198.374335][T28333] kmem_cache_alloc_node+0x264/0x710 [ 2198.379667][T28333] __alloc_skb+0xd5/0x5e0 [ 2198.384013][T28333] ? skb_trim+0x190/0x190 [ 2198.388356][T28333] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2198.394078][T28333] ? tcp_enter_memory_pressure+0x130/0x130 [ 2198.399905][T28333] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2198.405746][T28333] sk_stream_alloc_skb+0x326/0xd80 [ 2198.410875][T28333] do_tcp_sendpages+0xafa/0x1b70 [ 2198.415855][T28333] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2198.421163][T28333] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2198.427024][T28333] tls_push_sg+0x1de/0x680 [ 2198.431465][T28333] tls_tx_records+0x3c8/0x760 [ 2198.436167][T28333] tls_push_record+0x1f67/0x3580 [ 2198.441144][T28333] ? tls_tx_records+0x760/0x760 [ 2198.446011][T28333] ? lock_downgrade+0x880/0x880 [ 2198.450868][T28333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.457124][T28333] ? kasan_check_read+0x11/0x20 [ 2198.462007][T28333] bpf_exec_tx_verdict+0xe30/0x1280 [ 2198.467239][T28333] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2198.472973][T28333] ? tls_push_record+0x3580/0x3580 [ 2198.478261][T28333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2198.484532][T28333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.490832][T28333] ? sk_msg_alloc+0x62d/0x8d0 [ 2198.495540][T28333] tls_sw_sendmsg+0x107c/0x17b0 [ 2198.500519][T28333] ? tx_work_handler+0xf0/0xf0 [ 2198.505303][T28333] ? aa_sk_perm+0x288/0x880 [ 2198.509826][T28333] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2198.515397][T28333] inet_sendmsg+0x147/0x5e0 [ 2198.520041][T28333] ? ipip_gro_receive+0x100/0x100 [ 2198.525093][T28333] sock_sendmsg+0xf2/0x170 [ 2198.529523][T28333] __sys_sendto+0x262/0x380 [ 2198.534045][T28333] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2198.539443][T28333] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2198.545031][T28333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2198.551290][T28333] ? fput_many+0x12c/0x1a0 [ 2198.555726][T28333] ? fput+0x1b/0x20 [ 2198.559549][T28333] ? ksys_write+0x1cf/0x290 [ 2198.564082][T28333] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2198.569574][T28333] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2198.575089][T28333] ? do_syscall_64+0x26/0x680 [ 2198.575108][T28333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2198.575130][T28333] __x64_sys_sendto+0xe1/0x1a0 [ 2198.575149][T28333] do_syscall_64+0x103/0x680 [ 2198.575168][T28333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2198.575180][T28333] RIP: 0033:0x458da9 [ 2198.575204][T28333] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2198.586034][T28333] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2198.586049][T28333] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2198.586058][T28333] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2198.586066][T28333] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2198.586074][T28333] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2198.586082][T28333] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 [ 2198.757969][T28353] IPVS: ftp: loaded support on port[0] = 21 [ 2198.850993][T28346] IPv6 header not found [ 2198.855262][T28346] IPv6 header not found [ 2198.900168][T28350] IPv6 header not found [ 2198.904422][T28350] IPv6 header not found 17:20:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="9d0200000000000024a620a6015c"]) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 17:20:26 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8847000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000080)=0x1, 0x4) r1 = openat$cgroup_int(r0, &(0x7f0000000040), 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x10001, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000000)=0x1, 0x4) ppoll(&(0x7f0000000080)=[{r3}, {r1, 0x100000003508}], 0x2, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) 17:20:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001280)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x100000001, @empty, 0x101}, @in6={0xa, 0x4e20, 0x2, @loopback, 0x6957}, @in6={0xa, 0x4e21, 0xffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}], 0x54) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000011c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) recvmmsg(r2, &(0x7f0000001180)=[{{0x0, 0xfffffffffffffe5a, &(0x7f0000004700)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x0, 0x0, 0x1e5}}], 0x400000000000039, 0x0, 0x0) r3 = accept(r2, 0x0, &(0x7f0000001dc0)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001e40)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000001f80)={&(0x7f0000001e00)={0x10, 0x0, 0x0, 0x110a4000}, 0xc, &(0x7f0000001f40)={&(0x7f0000001e80)=ANY=[@ANYBLOB="90000000", @ANYRES16=r4, @ANYBLOB="020325bd7000fbdbdf250500000008000500010000001c00020008000500ff0f00000800060006000000080006000008000008000600010000005000010014000300ac1414aa0000000000000000008000000800020077000000080001000200000008000b0072697000080006006f766600080001000a000000080004004e20000008000b0073697000"], 0x90}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) 17:20:26 executing program 1 (fault-call:9 fault-nth:72): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe21, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x11) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "8831a5af44daf490", "befce0ed6c5b26fdb9d4ead50fc60d9042db17ec7839776549a97fadb35e1d44", "30cd88a2", "286bebce03dca799"}, 0x38) sendto$inet6(r1, &(0x7f00000005c0), 0x51e5a7c80024e6ee, 0x40, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x400000000000176, 0x0) 17:20:26 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xc5) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x0, 0x6, 0x7, 0x0, 0xffff}) 17:20:26 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="180000000000000001000000bd0000000000020000000000"], 0x18}}], 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_out(r0, 0x10084464, &(0x7f0000000280)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000002300)={r0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002480)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000002540)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)=@gettfilter={0x2c, 0x2e, 0x30d, 0x70bd2a, 0x25dfdbfd, {0x0, r2, {0xe, 0xfff3}, {0xffff, 0xb}, {0xfff3, 0x18}}, [{0x8, 0xb, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) bind$unix(r0, &(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) [ 2199.250027][T28369] FAULT_INJECTION: forcing a failure. [ 2199.250027][T28369] name failslab, interval 1, probability 0, space 0, times 0 [ 2199.280610][T28369] CPU: 1 PID: 28369 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2199.288225][T28369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2199.298285][T28369] Call Trace: [ 2199.301618][T28369] dump_stack+0x172/0x1f0 [ 2199.307137][T28369] should_fail.cold+0xa/0x15 [ 2199.315394][T28369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2199.321223][T28369] ? ___might_sleep+0x163/0x280 [ 2199.326125][T28369] __should_failslab+0x121/0x190 [ 2199.331072][T28369] should_failslab+0x9/0x14 [ 2199.335611][T28369] kmem_cache_alloc_node_trace+0x270/0x720 [ 2199.341458][T28369] __kmalloc_node_track_caller+0x3d/0x70 [ 2199.347106][T28369] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2199.353850][T28369] __alloc_skb+0x10b/0x5e0 [ 2199.358278][T28369] ? skb_trim+0x190/0x190 [ 2199.362615][T28369] ? tcp_leave_memory_pressure+0x2a/0x110 [ 2199.368348][T28369] ? tcp_enter_memory_pressure+0x130/0x130 [ 2199.374179][T28369] ? __sk_mem_raise_allocated+0x62b/0x1390 [ 2199.380001][T28369] sk_stream_alloc_skb+0x326/0xd80 [ 2199.385130][T28369] do_tcp_sendpages+0xafa/0x1b70 [ 2199.390083][T28369] ? sk_stream_alloc_skb+0xd80/0xd80 [ 2199.395386][T28369] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2199.401228][T28369] tls_push_sg+0x1de/0x680 [ 2199.405659][T28369] tls_tx_records+0x3c8/0x760 [ 2199.410615][T28369] tls_push_record+0x1f67/0x3580 [ 2199.415575][T28369] ? tls_tx_records+0x760/0x760 [ 2199.420434][T28369] ? lock_downgrade+0x880/0x880 [ 2199.425284][T28369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.431556][T28369] ? kasan_check_read+0x11/0x20 [ 2199.436444][T28369] bpf_exec_tx_verdict+0xe30/0x1280 [ 2199.441660][T28369] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2199.447386][T28369] ? tls_push_record+0x3580/0x3580 [ 2199.452572][T28369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2199.458827][T28369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.465071][T28369] ? sk_msg_alloc+0x62d/0x8d0 [ 2199.469759][T28369] tls_sw_sendmsg+0x107c/0x17b0 [ 2199.474637][T28369] ? tx_work_handler+0xf0/0xf0 [ 2199.480375][T28369] ? aa_sk_perm+0x288/0x880 [ 2199.484893][T28369] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2199.490455][T28369] inet_sendmsg+0x147/0x5e0 [ 2199.495109][T28369] ? ipip_gro_receive+0x100/0x100 [ 2199.500147][T28369] sock_sendmsg+0xf2/0x170 [ 2199.504570][T28369] __sys_sendto+0x262/0x380 [ 2199.509090][T28369] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2199.514474][T28369] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2199.520038][T28369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2199.526313][T28369] ? fput_many+0x12c/0x1a0 [ 2199.530734][T28369] ? fput+0x1b/0x20 [ 2199.534543][T28369] ? ksys_write+0x1cf/0x290 [ 2199.539061][T28369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2199.544521][T28369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2199.549979][T28369] ? do_syscall_64+0x26/0x680 [ 2199.554658][T28369] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2199.560731][T28369] __x64_sys_sendto+0xe1/0x1a0 [ 2199.565505][T28369] do_syscall_64+0x103/0x680 [ 2199.570101][T28369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2199.575998][T28369] RIP: 0033:0x458da9 [ 2199.579891][T28369] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2199.599500][T28369] RSP: 002b:00007f939fda5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2199.607918][T28369] RAX: ffffffffffffffda RBX: 00007f939fda5c90 RCX: 0000000000458da9 [ 2199.615892][T28369] RDX: 51e5a7c80024e6ee RSI: 00000000200005c0 RDI: 0000000000000004 [ 2199.623901][T28369] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2199.631881][T28369] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f939fda66d4 [ 2199.639862][T28369] R13: 00000000004c684e R14: 00000000004db520 R15: 0000000000000006 17:20:26 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8848000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x100000001, 0x10000000007, 0xfffffffffffffffe, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000200)="046f3873cb241f01ceae870b78750589216e6f65bd404562b30495ab00"/40}, 0x85) recvmsg(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000740)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e00)=[{&(0x7f00000007c0)=""/101, 0x65}, {&(0x7f0000000840)=""/80, 0x50}, {&(0x7f00000008c0)=""/46, 0x2e}, {&(0x7f0000000900)=""/197, 0xc5}, {&(0x7f0000000a00)=""/166, 0xa6}, {&(0x7f0000000ac0)=""/235, 0xeb}, {&(0x7f0000000bc0)=""/221, 0xdd}, {&(0x7f0000000cc0)=""/18, 0x12}, {&(0x7f0000000d00)=""/207, 0xcf}], 0x9, &(0x7f0000000ec0)=""/252, 0xfc}, 0x20) sendto$rxrpc(r1, &(0x7f0000001000)="001ec6d0efcb81e7b48611a5fa5132ffdce21bf66a30245b4020e016ef135a5cfc1e491c15ba84bfbf9fc8780ab0a010a578523b982dc60fa1b5200e52e0d257071d513992f97df7e0bebc92c374048912971a07316e9d69d092db888d4ee6d0169199e4897aa05a8cf817f1059b2e716ca4e89df4dbeb3067f82102f3ac6d93d0ad46910be5d00e56333f2336209fd4580d99b10487a9ea48ede7f648343f14277ac04b182706949ea44a86024cc5fb6f84f6d9d573f1648e16d2caf70a064f027290dd5ddbf4ef674a18d9c482694036c9ad1351e74ce5d1d2b386fa6144ab5bcc6bb880f667b1d169", 0xea, 0x20000804, &(0x7f0000001100)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0x8}}, 0x24) recvfrom$unix(r0, &(0x7f00000000c0)=""/188, 0xbc, 0x40, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) [ 2199.788272][T28368] ================================================================== [ 2199.796750][T28368] BUG: KASAN: use-after-free in tls_push_sg+0x5e2/0x680 [ 2199.803706][T28368] Read of size 4 at addr ffff888066f4d584 by task syz-executor.1/28368 [ 2199.811947][T28368] [ 2199.814296][T28368] CPU: 0 PID: 28368 Comm: syz-executor.1 Not tainted 5.1.0+ #9 [ 2199.821841][T28368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2199.831903][T28368] Call Trace: [ 2199.835218][T28368] dump_stack+0x172/0x1f0 [ 2199.839558][T28368] ? tls_push_sg+0x5e2/0x680 [ 2199.844181][T28368] print_address_description.cold+0x7c/0x20d [ 2199.850167][T28368] ? tls_push_sg+0x5e2/0x680 [ 2199.854772][T28368] ? tls_push_sg+0x5e2/0x680 [ 2199.859373][T28368] __kasan_report.cold+0x1b/0x40 [ 2199.864333][T28368] ? tls_push_sg+0x5e2/0x680 [ 2199.868934][T28368] kasan_report+0x12/0x20 [ 2199.873274][T28368] __asan_report_load4_noabort+0x14/0x20 [ 2199.878918][T28368] tls_push_sg+0x5e2/0x680 [ 2199.883356][T28368] tls_sk_proto_close+0x4a8/0x780 [ 2199.888399][T28368] ? tcp_check_oom+0x560/0x560 [ 2199.893294][T28368] ? tls_push_sg+0x680/0x680 [ 2199.897906][T28368] ? ip_mc_drop_socket+0x211/0x270 [ 2199.903065][T28368] ? __sock_release+0x89/0x2b0 [ 2199.907848][T28368] inet_release+0x105/0x1f0 [ 2199.912389][T28368] inet6_release+0x53/0x80 [ 2199.916830][T28368] __sock_release+0xd3/0x2b0 [ 2199.921445][T28368] sock_close+0x1b/0x30 [ 2199.925634][T28368] __fput+0x302/0x890 [ 2199.929652][T28368] ? __sock_release+0x2b0/0x2b0 [ 2199.934531][T28368] ____fput+0x16/0x20 [ 2199.938523][T28368] task_work_run+0x14a/0x1c0 [ 2199.943135][T28368] exit_to_usermode_loop+0x273/0x2c0 [ 2199.948442][T28368] do_syscall_64+0x594/0x680 [ 2199.953066][T28368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2199.958965][T28368] RIP: 0033:0x412b61 [ 2199.962869][T28368] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2199.982487][T28368] RSP: 002b:00007fff8622b0f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2199.991034][T28368] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000412b61 [ 2199.999019][T28368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2200.007008][T28368] RBP: 0000000000000001 R08: 00000000bb5eab81 R09: 00000000bb5eab85 [ 2200.015083][T28368] R10: 00007fff8622b1d0 R11: 0000000000000293 R12: 000000000073c900 [ 2200.023074][T28368] R13: 000000000073c900 R14: 00000000002190c3 R15: 000000000073bfac [ 2200.031073][T28368] [ 2200.033483][T28368] Allocated by task 28369: [ 2200.037925][T28368] save_stack+0x23/0x90 [ 2200.042105][T28368] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2200.047751][T28368] kasan_kmalloc+0x9/0x10 [ 2200.052102][T28368] __kmalloc+0x15c/0x740 [ 2200.056360][T28368] tls_get_rec+0x104/0x590 [ 2200.060789][T28368] tls_sw_sendmsg+0xda5/0x17b0 [ 2200.066528][T28368] inet_sendmsg+0x147/0x5e0 [ 2200.071048][T28368] sock_sendmsg+0xf2/0x170 [ 2200.075567][T28368] __sys_sendto+0x262/0x380 [ 2200.080121][T28368] __x64_sys_sendto+0xe1/0x1a0 [ 2200.084932][T28368] do_syscall_64+0x103/0x680 [ 2200.089539][T28368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2200.095431][T28368] [ 2200.097954][T28368] Freed by task 4964: [ 2200.101953][T28368] save_stack+0x23/0x90 [ 2200.106141][T28368] __kasan_slab_free+0x102/0x150 [ 2200.111096][T28368] kasan_slab_free+0xe/0x10 [ 2200.115624][T28368] kfree+0xcf/0x230 [ 2200.119446][T28368] tls_tx_records+0x4c6/0x760 [ 2200.124130][T28368] tx_work_handler+0xba/0xf0 [ 2200.128732][T28368] process_one_work+0x98e/0x1790 [ 2200.133688][T28368] worker_thread+0x98/0xe40 [ 2200.138213][T28368] kthread+0x357/0x430 [ 2200.142295][T28368] ret_from_fork+0x3a/0x50 [ 2200.146717][T28368] [ 2200.149075][T28368] The buggy address belongs to the object at ffff888066f4d280 [ 2200.149075][T28368] which belongs to the cache kmalloc-2k of size 2048 [ 2200.163255][T28368] The buggy address is located 772 bytes inside of [ 2200.163255][T28368] 2048-byte region [ffff888066f4d280, ffff888066f4da80) [ 2200.176635][T28368] The buggy address belongs to the page: [ 2200.182284][T28368] page:ffffea00019bd300 count:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 compound_mapcount: 0 [ 2200.192976][T28368] flags: 0x1fffc0000010200(slab|head) [ 2200.198364][T28368] raw: 01fffc0000010200 ffffea0002413588 ffffea0001aa2a08 ffff8880aa400c40 [ 2200.206980][T28368] raw: 0000000000000000 ffff888066f4c180 0000000100000003 0000000000000000 [ 2200.215578][T28368] page dumped because: kasan: bad access detected [ 2200.222013][T28368] [ 2200.224349][T28368] Memory state around the buggy address: [ 2200.229993][T28368] ffff888066f4d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2200.238068][T28368] ffff888066f4d500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2200.246149][T28368] >ffff888066f4d580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2200.254223][T28368] ^ [ 2200.258334][T28368] ffff888066f4d600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2200.266507][T28368] ffff888066f4d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2200.274576][T28368] ================================================================== [ 2200.282699][T28368] Disabling lock debugging due to kernel taint 17:20:27 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x8864000000000000, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:20:27 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xc5) sendfile(r1, r1, &(0x7f00000000c0), 0xfdef) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x0, 0x6, 0x7, 0x0, 0xffff}) [ 2200.292469][ C1] net_ratelimit: 4 callbacks suppressed [ 2200.292475][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2200.309501][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2200.315376][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2200.321494][ C1] protocol 88fb is buggy, dev hsr_slave_1 17:20:27 executing program 5: bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffeb8, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1, 0x1, 0x20, 0x7f}, 0xc) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) socket(0x9, 0x80b, 0x652b68bc) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) accept(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x0) [ 2200.350714][T28368] Kernel panic - not syncing: panic_on_warn set ... [ 2200.357438][T28368] CPU: 1 PID: 28368 Comm: syz-executor.1 Tainted: G B 5.1.0+ #9 [ 2200.366373][T28368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2200.376436][T28368] Call Trace: [ 2200.379740][T28368] dump_stack+0x172/0x1f0 [ 2200.384135][T28368] panic+0x2cb/0x65c [ 2200.388043][T28368] ? __warn_printk+0xf3/0xf3 [ 2200.392639][T28368] ? tls_push_sg+0x5e2/0x680 [ 2200.397240][T28368] ? preempt_schedule+0x4b/0x60 [ 2200.402095][T28368] ? ___preempt_schedule+0x16/0x18 [ 2200.407228][T28368] ? trace_hardirqs_on+0x5e/0x230 [ 2200.412263][T28368] ? tls_push_sg+0x5e2/0x680 [ 2200.416857][T28368] end_report+0x47/0x4f [ 2200.421013][T28368] ? tls_push_sg+0x5e2/0x680 [ 2200.425706][T28368] __kasan_report.cold+0xe/0x40 [ 2200.430564][T28368] ? tls_push_sg+0x5e2/0x680 [ 2200.435172][T28368] kasan_report+0x12/0x20 [ 2200.439509][T28368] __asan_report_load4_noabort+0x14/0x20 [ 2200.445242][T28368] tls_push_sg+0x5e2/0x680 [ 2200.449670][T28368] tls_sk_proto_close+0x4a8/0x780 [ 2200.454704][T28368] ? tcp_check_oom+0x560/0x560 [ 2200.459470][T28368] ? tls_push_sg+0x680/0x680 [ 2200.464067][T28368] ? ip_mc_drop_socket+0x211/0x270 [ 2200.469180][T28368] ? __sock_release+0x89/0x2b0 [ 2200.473945][T28368] inet_release+0x105/0x1f0 [ 2200.478454][T28368] inet6_release+0x53/0x80 [ 2200.483363][T28368] __sock_release+0xd3/0x2b0 [ 2200.487967][T28368] sock_close+0x1b/0x30 [ 2200.492141][T28368] __fput+0x302/0x890 [ 2200.496138][T28368] ? __sock_release+0x2b0/0x2b0 [ 2200.500997][T28368] ____fput+0x16/0x20 [ 2200.504981][T28368] task_work_run+0x14a/0x1c0 [ 2200.508136][ T3880] kobject: 'loop4' (000000008b064af3): kobject_uevent_env [ 2200.509583][T28368] exit_to_usermode_loop+0x273/0x2c0 [ 2200.522005][T28368] do_syscall_64+0x594/0x680 [ 2200.526622][T28368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2200.531714][ T3880] kobject: 'loop4' (000000008b064af3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2200.532520][T28368] RIP: 0033:0x412b61 [ 2200.532534][T28368] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2200.532540][T28368] RSP: 002b:00007fff8622b0f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2200.532551][T28368] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000412b61 [ 2200.532558][T28368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2200.532573][T28368] RBP: 0000000000000001 R08: 00000000bb5eab81 R09: 00000000bb5eab85 [ 2200.586052][ T3880] kobject: 'loop5' (0000000035fc07b1): kobject_uevent_env [ 2200.590936][T28368] R10: 00007fff8622b1d0 R11: 0000000000000293 R12: 000000000073c900 [ 2200.590944][T28368] R13: 000000000073c900 R14: 00000000002190c3 R15: 000000000073bfac [ 2200.600500][T28368] Kernel Offset: disabled [ 2200.628382][T28368] Rebooting in 86400 seconds..