Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts.
2020/06/20 07:02:46 fuzzer started
2020/06/20 07:02:46 dialing manager at 10.128.0.26:46835
2020/06/20 07:02:46 syscalls: 2928
2020/06/20 07:02:46 code coverage: enabled
2020/06/20 07:02:46 comparison tracing: enabled
2020/06/20 07:02:46 extra coverage: enabled
2020/06/20 07:02:46 setuid sandbox: enabled
2020/06/20 07:02:46 namespace sandbox: enabled
2020/06/20 07:02:46 Android sandbox: /sys/fs/selinux/policy does not exist
2020/06/20 07:02:46 fault injection: enabled
2020/06/20 07:02:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2020/06/20 07:02:46 net packet injection: enabled
2020/06/20 07:02:46 net device setup: enabled
2020/06/20 07:02:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2020/06/20 07:02:46 devlink PCI setup: PCI device 0000:00:10.0 is not available
2020/06/20 07:02:46 USB emulation: enabled
07:04:30 executing program 0:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000001000"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b80080001001f68caf52aacacd17c808bfa54edbeab6574142b28ad19b5ff2bd85abb00100000000000006aeb896111b7539c388c69b22a098b46be8a8319cdcbc9d124becfe1f4d22b38eb", @ANYRES32, @ANYBLOB="08001b0000000000"], 0x34}}, 0x0)
io_setup(0x202, &(0x7f00000004c0)=<r0=>0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
io_getevents(r0, 0x2, 0x2, &(0x7f0000000540)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680})

syzkaller login: [  160.407359][ T6811] IPVS: ftp: loaded support on port[0] = 21
07:04:30 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2})
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x0, 0x40000007, 0x100, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  160.565219][ T6811] chnl_net:caif_netlink_parms(): no params data found
[  160.667805][ T6811] bridge0: port 1(bridge_slave_0) entered blocking state
[  160.695101][ T6811] bridge0: port 1(bridge_slave_0) entered disabled state
[  160.698933][ T6941] IPVS: ftp: loaded support on port[0] = 21
[  160.710530][ T6811] device bridge_slave_0 entered promiscuous mode
[  160.728904][ T6811] bridge0: port 2(bridge_slave_1) entered blocking state
[  160.736580][ T6811] bridge0: port 2(bridge_slave_1) entered disabled state
[  160.746171][ T6811] device bridge_slave_1 entered promiscuous mode
[  160.800317][ T6811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  160.829269][ T6811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
07:04:30 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
close(r1)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0)

[  160.888891][ T6811] team0: Port device team_slave_0 added
[  160.923523][ T6811] team0: Port device team_slave_1 added
[  161.014142][ T6941] chnl_net:caif_netlink_parms(): no params data found
[  161.055937][ T6811] batman_adv: batadv0: Adding interface: batadv_slave_0
[  161.062918][ T6811] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  161.135036][ T6811] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  161.178417][ T6811] batman_adv: batadv0: Adding interface: batadv_slave_1
[  161.194536][ T6811] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
07:04:31 executing program 3:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_netfilter(0x10, 0x3, 0xc)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0)

[  161.231505][ T7079] IPVS: ftp: loaded support on port[0] = 21
[  161.246850][ T6811] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  161.387846][ T6811] device hsr_slave_0 entered promiscuous mode
[  161.444414][ T6811] device hsr_slave_1 entered promiscuous mode
[  161.467756][ T7115] IPVS: ftp: loaded support on port[0] = 21
[  161.490736][ T6941] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.500440][ T6941] bridge0: port 1(bridge_slave_0) entered disabled state
[  161.509062][ T6941] device bridge_slave_0 entered promiscuous mode
[  161.549559][ T6941] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.560150][ T6941] bridge0: port 2(bridge_slave_1) entered disabled state
[  161.569362][ T6941] device bridge_slave_1 entered promiscuous mode
07:04:31 executing program 4:
r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)
ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0)
lseek(r0, 0x2, 0x1)

[  161.690971][ T6941] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  161.706682][ T6941] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  161.772479][ T6941] team0: Port device team_slave_0 added
[  161.815574][ T6941] team0: Port device team_slave_1 added
[  161.949295][ T6941] batman_adv: batadv0: Adding interface: batadv_slave_0
[  161.982730][ T6941] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  162.046363][ T6941] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
07:04:31 executing program 5:
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000))
madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15)
pipe(&(0x7f0000000280)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00')
sendfile(r0, r1, 0x0, 0x100000080006c00)

[  162.154840][ T6941] batman_adv: batadv0: Adding interface: batadv_slave_1
[  162.161822][ T6941] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  162.207314][ T7319] IPVS: ftp: loaded support on port[0] = 21
[  162.220877][ T6941] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  162.253355][ T7329] IPVS: ftp: loaded support on port[0] = 21
[  162.286735][ T7079] chnl_net:caif_netlink_parms(): no params data found
[  162.368412][ T6941] device hsr_slave_0 entered promiscuous mode
[  162.424497][ T6941] device hsr_slave_1 entered promiscuous mode
[  162.484113][ T6941] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  162.491838][ T6941] Cannot create hsr debugfs directory
[  162.508107][ T6811] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  162.558659][ T6811] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  162.619451][ T6811] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  162.687252][ T7115] chnl_net:caif_netlink_parms(): no params data found
[  162.733724][ T6811] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  162.912337][ T7115] bridge0: port 1(bridge_slave_0) entered blocking state
[  162.920573][ T7115] bridge0: port 1(bridge_slave_0) entered disabled state
[  162.929096][ T7115] device bridge_slave_0 entered promiscuous mode
[  162.943993][ T7115] bridge0: port 2(bridge_slave_1) entered blocking state
[  162.951062][ T7115] bridge0: port 2(bridge_slave_1) entered disabled state
[  162.961351][ T7115] device bridge_slave_1 entered promiscuous mode
[  163.013542][ T7079] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.024133][ T7079] bridge0: port 1(bridge_slave_0) entered disabled state
[  163.031884][ T7079] device bridge_slave_0 entered promiscuous mode
[  163.041903][ T7079] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.049319][ T7079] bridge0: port 2(bridge_slave_1) entered disabled state
[  163.058434][ T7079] device bridge_slave_1 entered promiscuous mode
[  163.121608][ T7115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  163.140891][ T7115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  163.192800][ T7079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  163.253348][ T7079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  163.348017][ T7115] team0: Port device team_slave_0 added
[  163.387054][ T7329] chnl_net:caif_netlink_parms(): no params data found
[  163.400807][ T7115] team0: Port device team_slave_1 added
[  163.424292][ T7319] chnl_net:caif_netlink_parms(): no params data found
[  163.446604][ T7079] team0: Port device team_slave_0 added
[  163.473492][ T7115] batman_adv: batadv0: Adding interface: batadv_slave_0
[  163.484752][ T7115] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  163.511910][ T7115] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  163.528751][ T7115] batman_adv: batadv0: Adding interface: batadv_slave_1
[  163.535853][ T7115] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  163.563236][ T7115] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  163.586374][ T7079] team0: Port device team_slave_1 added
[  163.652921][ T6941] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  163.713565][ T6941] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  163.816969][ T7115] device hsr_slave_0 entered promiscuous mode
[  163.864495][ T7115] device hsr_slave_1 entered promiscuous mode
[  163.924244][ T7115] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  163.931783][ T7115] Cannot create hsr debugfs directory
[  163.941844][ T6941] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  163.986419][ T7079] batman_adv: batadv0: Adding interface: batadv_slave_0
[  163.993401][ T7079] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  164.020506][ T7079] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  164.040255][ T6811] 8021q: adding VLAN 0 to HW filter on device bond0
[  164.058135][ T6941] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  164.106758][ T7079] batman_adv: batadv0: Adding interface: batadv_slave_1
[  164.113732][ T7079] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  164.143504][ T7079] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  164.191193][ T7329] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.199320][ T7329] bridge0: port 1(bridge_slave_0) entered disabled state
[  164.209536][ T7329] device bridge_slave_0 entered promiscuous mode
[  164.259984][ T7329] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.269706][ T7329] bridge0: port 2(bridge_slave_1) entered disabled state
[  164.280788][ T7329] device bridge_slave_1 entered promiscuous mode
[  164.301833][ T6811] 8021q: adding VLAN 0 to HW filter on device team0
[  164.318342][ T7319] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.325747][ T7319] bridge0: port 1(bridge_slave_0) entered disabled state
[  164.333693][ T7319] device bridge_slave_0 entered promiscuous mode
[  164.349146][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  164.360096][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  164.418400][ T7079] device hsr_slave_0 entered promiscuous mode
[  164.484843][ T7079] device hsr_slave_1 entered promiscuous mode
[  164.554346][ T7079] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  164.561886][ T7079] Cannot create hsr debugfs directory
[  164.588892][ T7319] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.597074][ T7319] bridge0: port 2(bridge_slave_1) entered disabled state
[  164.605310][ T7319] device bridge_slave_1 entered promiscuous mode
[  164.622620][ T7329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  164.661076][ T7329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  164.682822][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  164.693899][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  164.702931][ T2728] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.710220][ T2728] bridge0: port 1(bridge_slave_0) entered forwarding state
[  164.751744][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  164.762627][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  164.771719][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  164.781102][ T2728] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.788208][ T2728] bridge0: port 2(bridge_slave_1) entered forwarding state
[  164.801358][ T7319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  164.822637][ T7319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  164.883348][ T7329] team0: Port device team_slave_0 added
[  164.891504][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  164.901640][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  164.923171][ T7319] team0: Port device team_slave_0 added
[  164.949182][ T7329] team0: Port device team_slave_1 added
[  164.967875][ T7319] team0: Port device team_slave_1 added
[  164.981478][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  164.990951][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  165.000273][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  165.010926][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  165.020343][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  165.041486][ T6811] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  165.052885][ T6811] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  165.097711][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  165.106763][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  165.117060][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  165.126815][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  165.136212][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  165.147462][ T7329] batman_adv: batadv0: Adding interface: batadv_slave_0
[  165.154638][ T7329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  165.181029][ T7329] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  165.200496][ T7319] batman_adv: batadv0: Adding interface: batadv_slave_0
[  165.209740][ T7319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  165.237984][ T7319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  165.267852][ T7329] batman_adv: batadv0: Adding interface: batadv_slave_1
[  165.275936][ T7329] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  165.303366][ T7329] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  165.317701][ T7319] batman_adv: batadv0: Adding interface: batadv_slave_1
[  165.328638][ T7319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  165.360344][ T7319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  165.421995][ T7115] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  165.511283][ T7329] device hsr_slave_0 entered promiscuous mode
[  165.555670][ T7329] device hsr_slave_1 entered promiscuous mode
[  165.594405][ T7329] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  165.601987][ T7329] Cannot create hsr debugfs directory
[  165.617760][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  165.625267][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  165.633858][ T7115] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  165.687389][ T7115] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  165.777973][ T7319] device hsr_slave_0 entered promiscuous mode
[  165.834694][ T7319] device hsr_slave_1 entered promiscuous mode
[  165.895163][ T7319] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  165.902781][ T7319] Cannot create hsr debugfs directory
[  165.919970][ T6941] 8021q: adding VLAN 0 to HW filter on device bond0
[  165.933549][ T7115] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  165.992142][ T6811] 8021q: adding VLAN 0 to HW filter on device batadv0
[  166.113654][ T6941] 8021q: adding VLAN 0 to HW filter on device team0
[  166.141352][ T7079] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  166.179790][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  166.187789][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  166.220158][ T7079] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  166.300959][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  166.310691][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  166.320736][ T2507] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.327865][ T2507] bridge0: port 1(bridge_slave_0) entered forwarding state
[  166.336416][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  166.345621][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  166.353986][ T2507] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.361147][ T2507] bridge0: port 2(bridge_slave_1) entered forwarding state
[  166.368947][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  166.378969][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  166.388567][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  166.397870][ T7079] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  166.451812][ T7079] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  166.557915][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  166.566090][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  166.576284][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  166.586527][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  166.596274][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  166.604036][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  166.631338][ T6811] device veth0_vlan entered promiscuous mode
[  166.668999][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  166.679769][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  166.712777][ T6811] device veth1_vlan entered promiscuous mode
[  166.750188][ T7319] netdevsim netdevsim4 netdevsim0: renamed from eth0
[  166.787801][ T7319] netdevsim netdevsim4 netdevsim1: renamed from eth1
[  166.858274][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  166.867133][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  166.875676][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  166.884613][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  166.893029][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  166.901986][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  166.942257][ T7319] netdevsim netdevsim4 netdevsim2: renamed from eth2
[  167.011751][ T7319] netdevsim netdevsim4 netdevsim3: renamed from eth3
[  167.079466][ T6941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  167.090690][ T6941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  167.103549][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  167.112071][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  167.121669][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  167.181278][ T7115] 8021q: adding VLAN 0 to HW filter on device bond0
[  167.192095][ T7329] netdevsim netdevsim5 netdevsim0: renamed from eth0
[  167.248648][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  167.258224][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  167.275510][ T6811] device veth0_macvtap entered promiscuous mode
[  167.303562][ T7329] netdevsim netdevsim5 netdevsim1: renamed from eth1
[  167.366968][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  167.379283][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  167.388056][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  167.405211][ T7115] 8021q: adding VLAN 0 to HW filter on device team0
[  167.418321][ T7329] netdevsim netdevsim5 netdevsim2: renamed from eth2
[  167.476593][ T6811] device veth1_macvtap entered promiscuous mode
[  167.483902][ T7329] netdevsim netdevsim5 netdevsim3: renamed from eth3
[  167.564894][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  167.572894][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  167.581031][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  167.589976][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  167.599125][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  167.608096][ T2507] bridge0: port 1(bridge_slave_0) entered blocking state
[  167.615227][ T2507] bridge0: port 1(bridge_slave_0) entered forwarding state
[  167.625341][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  167.658251][ T6941] 8021q: adding VLAN 0 to HW filter on device batadv0
[  167.666871][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  167.677741][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  167.686639][ T2730] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.693669][ T2730] bridge0: port 2(bridge_slave_1) entered forwarding state
[  167.711843][ T6811] batman_adv: batadv0: Interface activated: batadv_slave_0
[  167.738259][ T7079] 8021q: adding VLAN 0 to HW filter on device bond0
[  167.755651][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  167.765874][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  167.774995][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  167.783509][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  167.798241][ T6811] batman_adv: batadv0: Interface activated: batadv_slave_1
[  167.835341][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  167.844081][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  167.859602][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  167.868825][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  167.878848][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  167.887859][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  167.933246][ T7079] 8021q: adding VLAN 0 to HW filter on device team0
[  167.942344][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  167.951376][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  167.960561][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  167.969702][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  167.978509][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  167.987669][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  167.996543][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  168.005070][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  168.012749][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  168.084695][ T7115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  168.158591][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  168.167675][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  168.180141][ T2484] bridge0: port 1(bridge_slave_0) entered blocking state
[  168.187315][ T2484] bridge0: port 1(bridge_slave_0) entered forwarding state
[  168.195108][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  168.203651][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  168.212276][ T2484] bridge0: port 2(bridge_slave_1) entered blocking state
[  168.219432][ T2484] bridge0: port 2(bridge_slave_1) entered forwarding state
[  168.227415][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  168.236293][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  168.268141][ T6941] device veth0_vlan entered promiscuous mode
[  168.340572][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  168.355524][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  168.363474][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  168.373657][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  168.383795][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  168.412974][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  168.423578][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  168.446731][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  168.455709][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  168.467021][ T3851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  168.490603][ T6941] device veth1_vlan entered promiscuous mode
[  168.521012][ T7115] 8021q: adding VLAN 0 to HW filter on device batadv0
[  168.540702][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  168.550499][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
07:04:38 executing program 0:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000001000"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b80080001001f68caf52aacacd17c808bfa54edbeab6574142b28ad19b5ff2bd85abb00100000000000006aeb896111b7539c388c69b22a098b46be8a8319cdcbc9d124becfe1f4d22b38eb", @ANYRES32, @ANYBLOB="08001b0000000000"], 0x34}}, 0x0)
io_setup(0x202, &(0x7f00000004c0)=<r0=>0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
io_getevents(r0, 0x2, 0x2, &(0x7f0000000540)=[{}, {}], &(0x7f0000000100)={0x0, 0x989680})

[  168.571794][ T7319] 8021q: adding VLAN 0 to HW filter on device bond0
[  168.595810][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  168.622852][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  168.648460][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  168.657520][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  168.680711][ T7079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  168.755494][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  168.765736][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  168.780876][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  168.792098][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
07:04:38 executing program 0:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe721, 0x4}, 0x18002, 0xfffffffffffffff9, 0xbb06, 0x0, 0x0, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
mkdir(&(0x7f0000000040)='./file0\x00', 0x102)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0)
dup(0xffffffffffffffff)
r0 = socket(0x1d, 0x0, 0xfffffffc)
ioctl$sock_ifreq(0xffffffffffffffff, 0x39, &(0x7f0000000040)={'vxcan1\x00', @ifru_data=&(0x7f00000002c0)="370df5673cc44958532b30997230251af86a8151f924869fb4b60399fed3f0d6"})
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0))
chdir(&(0x7f0000000140)='./file0\x00')
times(&(0x7f0000000300))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
rmdir(&(0x7f0000000100)='./file0\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={@mcast1, 0x34})
r2 = dup(r1)
mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x11)
getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000180)=0x8)
socket$inet_icmp_raw(0x2, 0x3, 0x1)

[  168.822257][ T7319] 8021q: adding VLAN 0 to HW filter on device team0
[  168.883842][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  168.905053][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  168.926548][ T2728] bridge0: port 1(bridge_slave_0) entered blocking state
07:04:38 executing program 0:

07:04:38 executing program 0:

[  168.933643][ T2728] bridge0: port 1(bridge_slave_0) entered forwarding state
[  168.964620][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  168.973080][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  168.995557][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  169.031695][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
07:04:38 executing program 0:

07:04:38 executing program 0:

[  169.051579][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  169.075382][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  169.083304][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
07:04:38 executing program 0:

[  169.179912][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  169.200367][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  169.224810][ T2732] bridge0: port 2(bridge_slave_1) entered blocking state
[  169.231914][ T2732] bridge0: port 2(bridge_slave_1) entered forwarding state
[  169.240927][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  169.253167][ T7115] device veth0_vlan entered promiscuous mode
[  169.261790][ T6941] device veth0_macvtap entered promiscuous mode
[  169.279134][ T7329] 8021q: adding VLAN 0 to HW filter on device bond0
[  169.294641][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  169.302141][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  169.332371][ T7115] device veth1_vlan entered promiscuous mode
[  169.360297][ T7079] 8021q: adding VLAN 0 to HW filter on device batadv0
[  169.377911][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  169.391005][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  169.400352][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  169.409377][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  169.418521][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  169.428912][ T6941] device veth1_macvtap entered promiscuous mode
[  169.452388][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  169.466139][ T7329] 8021q: adding VLAN 0 to HW filter on device team0
[  169.493038][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  169.510157][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  169.522610][ T6941] batman_adv: batadv0: Interface activated: batadv_slave_0
[  169.538215][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  169.547315][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  169.561733][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  169.570739][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  169.582984][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  169.593225][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  169.608264][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  169.617180][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  169.638207][ T7319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  169.650861][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  169.663102][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  169.672582][ T2507] bridge0: port 1(bridge_slave_0) entered blocking state
[  169.679806][ T2507] bridge0: port 1(bridge_slave_0) entered forwarding state
[  169.690347][ T6941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  169.702192][ T6941] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  169.715001][ T6941] batman_adv: batadv0: Interface activated: batadv_slave_1
[  169.750484][ T7115] device veth0_macvtap entered promiscuous mode
[  169.770515][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  169.781577][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  169.790870][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  169.800142][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  169.809422][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  169.818594][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  169.827607][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  169.836521][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  169.845512][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  169.853848][ T2507] bridge0: port 2(bridge_slave_1) entered blocking state
[  169.860953][ T2507] bridge0: port 2(bridge_slave_1) entered forwarding state
[  169.893317][ T7115] device veth1_macvtap entered promiscuous mode
[  169.909455][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  169.918288][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  169.927046][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  169.968366][ T7079] device veth0_vlan entered promiscuous mode
[  169.976808][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  169.989298][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  169.998454][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  170.007428][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  170.016308][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  170.025782][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  170.033186][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  170.041103][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  170.049596][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  170.058499][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  170.092634][ T7079] device veth1_vlan entered promiscuous mode
[  170.101939][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  170.112140][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  170.128468][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  170.138500][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  170.150408][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  170.161997][ T7319] 8021q: adding VLAN 0 to HW filter on device batadv0
[  170.169689][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  170.180268][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  170.190302][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  170.202487][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  170.215480][ T7115] batman_adv: batadv0: Interface activated: batadv_slave_0
[  170.272756][ T7329] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  170.284092][ T7329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  170.307091][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  170.316601][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  170.326136][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  170.336601][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  170.345048][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  170.358105][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  170.371370][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  170.382167][ T7115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  170.393323][ T7115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  170.405450][ T7115] batman_adv: batadv0: Interface activated: batadv_slave_1
[  170.475387][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  170.485577][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  170.582828][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  170.593152][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  170.609275][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  170.620962][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  170.663502][ T8087] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
[  170.728528][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000040 data 0x10000000006
[  170.744485][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000053 data 0x100000000e1
[  170.765142][ T7079] device veth0_macvtap entered promiscuous mode
[  170.779932][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000011 data 0x1000000004c
[  170.810246][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000067 data 0x10000000046
[  170.812912][ T7329] 8021q: adding VLAN 0 to HW filter on device batadv0
[  170.822069][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000001e data 0x10000000066
[  170.841179][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000078 data 0x10000000071
[  170.852162][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  170.861905][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  170.870959][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000000b data 0x10000000019
[  170.881468][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  170.889120][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000026 data 0x10000000004
[  170.904122][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000089 data 0x10000000027
[  170.916382][ T8087] kvm [8086]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000014 data 0x10000000011
[  170.972902][ T7319] device veth0_vlan entered promiscuous mode
[  170.987145][ T7079] device veth1_macvtap entered promiscuous mode
[  171.045462][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  171.053648][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  171.069814][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  171.100643][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  171.132606][ T8104] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.3'.
[  171.141231][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
07:04:40 executing program 1:

[  171.177698][ T7319] device veth1_vlan entered promiscuous mode
[  171.244268][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  171.257417][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.275143][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  171.286845][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.296844][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  171.308342][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.332163][ T7079] batman_adv: batadv0: Interface activated: batadv_slave_0
[  171.349983][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  171.366307][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  171.382214][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  171.391436][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  171.402208][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  171.413439][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  171.455045][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  171.479164][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.494671][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  171.506586][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.516500][ T7079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  171.527020][ T7079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.539138][ T7079] batman_adv: batadv0: Interface activated: batadv_slave_1
[  171.566165][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  171.577119][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  171.587173][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  171.598869][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  171.614792][ T7329] device veth0_vlan entered promiscuous mode
[  171.632755][ T7319] device veth0_macvtap entered promiscuous mode
[  171.640924][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  171.649397][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  171.658608][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  171.668316][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  171.743476][ T7319] device veth1_macvtap entered promiscuous mode
[  171.756412][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  171.766004][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  171.777535][ T7329] device veth1_vlan entered promiscuous mode
[  171.936255][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  171.954641][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.966508][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  171.977846][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  171.989415][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  172.001120][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  172.012687][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  172.024097][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  172.046903][ T7319] batman_adv: batadv0: Interface activated: batadv_slave_0
[  172.091034][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  172.100649][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  172.110160][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  172.120898][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  172.135963][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  172.149971][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  172.161441][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  172.173907][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  172.185229][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  172.197901][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  172.209416][ T7319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  172.220850][ T7319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  172.233076][ T7319] batman_adv: batadv0: Interface activated: batadv_slave_1
[  172.246822][ T8113] netlink: 'syz-executor.2': attribute type 5 has an invalid length.
[  172.259490][ T8113] device macvtap1 entered promiscuous mode
[  172.270001][ T8113] device batadv0 entered promiscuous mode
[  172.279901][ T8113] 8021q: adding VLAN 0 to HW filter on device macvtap1
[  172.287426][ T8113] team0: Device macvtap1 failed to register rx_handler
[  172.295861][ T8113] device batadv0 left promiscuous mode
[  172.522562][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  172.531669][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  172.541964][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  172.551639][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  172.567284][ T7329] device veth0_macvtap entered promiscuous mode
[  172.589229][ T7329] device veth1_macvtap entered promiscuous mode
[  172.672133][ T8113] netlink: 'syz-executor.2': attribute type 5 has an invalid length.
[  172.684036][ T8113] device macvtap1 entered promiscuous mode
[  172.691091][ T8113] device batadv0 entered promiscuous mode
[  172.698676][ T8113] 8021q: adding VLAN 0 to HW filter on device macvtap1
[  172.708046][ T8113] team0: Device macvtap1 failed to register rx_handler
[  172.716996][ T8113] device batadv0 left promiscuous mode
07:04:42 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
close(r1)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0)

07:04:42 executing program 0:

[  173.029099][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  173.055849][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.095090][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  173.135324][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
07:04:42 executing program 4:
r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)
ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe)
mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0)
lseek(r0, 0x2, 0x1)

[  173.192781][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  173.214698][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.231647][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  173.243667][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.261936][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  173.299190][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.320767][ T7329] batman_adv: batadv0: Interface activated: batadv_slave_0
[  173.336074][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  173.347262][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.358077][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  173.369333][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.380541][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  173.421827][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.443651][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  173.466031][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.476555][ T7329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  173.487614][ T7329] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  173.500300][ T7329] batman_adv: batadv0: Interface activated: batadv_slave_1
[  173.510353][ T8132] netlink: 'syz-executor.2': attribute type 5 has an invalid length.
[  173.529364][ T8132] device macvtap1 entered promiscuous mode
[  173.536129][ T8132] device batadv0 entered promiscuous mode
[  173.543813][ T8132] 8021q: adding VLAN 0 to HW filter on device macvtap1
[  173.554248][ T8132] team0: Device macvtap1 failed to register rx_handler
[  173.566810][ T8132] device batadv0 left promiscuous mode
[  173.701225][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  173.717187][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  173.732210][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  173.745099][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  173.765937][ T2507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
07:04:43 executing program 5:

07:04:43 executing program 1:

07:04:43 executing program 3:

07:04:43 executing program 0:

07:04:43 executing program 4:

07:04:43 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
close(r1)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0)

07:04:43 executing program 4:
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x0)
close(r0)
syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0)

07:04:43 executing program 0:
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0)
get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002dd000/0x1000)=nil, 0x3)

07:04:43 executing program 1:
syz_emit_ethernet(0xec, &(0x7f0000000280)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209240", 0xb6, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}, {"e18769c9382865976ffec29e627ede782cf0ed3cd656ab1763f62ae996bd645ed06d3ef7b7f70e688421e135fcf068ea5ef96f1278bdfdd7e732999d988dd48beb8a50a220c58eccbae707c0c39ced17767521dbbf804bf75f8e1979b13414d9a9a648e29bdfc35500d79439eabe2f01ecea2ad88f896f26102542ccb82de0d2d5eaf758352b50a003a8970d6a4eafa6792e8786dc5232fa1c6ed4c2906f3caf8528"}}}}}}}, 0x0)

07:04:43 executing program 5:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$setlease(r0, 0x400, 0x0)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
fcntl$getflags(r1, 0x401)

[  174.174289][ T8156] netlink: 'syz-executor.2': attribute type 5 has an invalid length.
07:04:43 executing program 3:
r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x4})

07:04:44 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0)

[  174.254126][ T8156] device macvtap1 entered promiscuous mode
[  174.283424][ T8156] device batadv0 entered promiscuous mode
07:04:44 executing program 3:
getrlimit(0x271ed26218092102, 0x0)

[  174.318047][ T8156] 8021q: adding VLAN 0 to HW filter on device macvtap1
[  174.352734][ T8156] team0: Device macvtap1 failed to register rx_handler
07:04:44 executing program 1:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}], 0x10)
listen(r0, 0x0)

07:04:44 executing program 5:
r0 = socket(0x11, 0x800000003, 0x0)
bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
r2 = socket(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="7800000024000b1000"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100736671004c0002"], 0x78}}, 0x0)

[  174.384228][ T8169] syz-executor.1 (8169) used greatest stack depth: 22832 bytes left
[  174.407455][ T8156] device batadv0 left promiscuous mode
07:04:44 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:44 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0)

[  174.581149][    C1] hrtimer: interrupt took 49325 ns
07:04:44 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x44000)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
close(r1)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507feff05110000000000000000", @ANYRES32=0x0, @ANYBLOB="0009000000190000140012800c0001006d61637674617000040002800a000500140000000000000008000a00", @ANYRES32=r2], 0x48}}, 0x0)

07:04:44 executing program 4:
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x0)
close(r0)
syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0)

07:04:44 executing program 1:
r0 = syz_open_dev$vbi(0x0, 0x1, 0x2)
r1 = getpid()
ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6(0xa, 0x800000000000002, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0)

07:04:44 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0)

07:04:44 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:44 executing program 5:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}], 0x1c)

07:04:44 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))
mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0)

[  175.163104][ T8213] netlink: 'syz-executor.2': attribute type 5 has an invalid length.
07:04:44 executing program 5:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0xffffffff, 0x0)
mlock(&(0x7f0000ad9000/0x3000)=nil, 0x3000)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0)
mbind(&(0x7f0000931000/0xe000)=nil, 0xe000, 0x0, 0x0, 0x0, 0x0)

07:04:44 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:45 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x4e00)
openat$mixer(0xffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x8000, 0x0)
open(0x0, 0x0, 0x88)
syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00')
socket(0x0, 0x805, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0x4)

[  175.248574][ T8213] device macvtap1 entered promiscuous mode
[  175.282093][ T8213] device batadv0 entered promiscuous mode
[  175.301976][ T8222] mmap: syz-executor.5 (8222) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst.
[  175.316098][ T8213] 8021q: adding VLAN 0 to HW filter on device macvtap1
[  175.352281][ T8213] team0: Device macvtap1 failed to register rx_handler
07:04:45 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000000)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

[  175.408954][ T8213] device batadv0 left promiscuous mode
07:04:45 executing program 5:
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x0)
get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002dd000/0x1000)=nil, 0x2)

07:04:46 executing program 2:
getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x200040000000015, 0x0, 0x0)
r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000005c0)="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", 0x174, 0xfffffffffffffffd)
r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}})
ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0)

07:04:46 executing program 5:
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000))
madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x2000000000002)
syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00')
pipe(&(0x7f0000000280))
syz_open_procfs(0x0, 0x0)
r0 = shmget(0x3, 0x3000, 0x78000200, &(0x7f0000ffd000/0x3000)=nil)
shmctl$IPC_RMID(r0, 0x0)
pipe(&(0x7f0000000280))
shmat(0x0, &(0x7f0000340000/0x3000)=nil, 0x7000)

07:04:46 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:46 executing program 4:
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0)
madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15)
r0 = shmget(0x1, 0x2000, 0x0, &(0x7f00005db000/0x2000)=nil)
pipe(&(0x7f0000000280)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00')
sendfile(r1, r2, 0x0, 0x100000080006c00)
shmat(r0, &(0x7f0000340000/0x3000)=nil, 0x7000)

07:04:46 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:46 executing program 5:
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000))
madvise(&(0x7f00001a3000/0x4000)=nil, 0x4000, 0x15)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x434f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x4, 0x0, 0x0, 0x2000000000002)
syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00')
pipe(&(0x7f0000000280))
syz_open_procfs(0x0, 0x0)
r0 = shmget(0x3, 0x3000, 0x78000200, &(0x7f0000ffd000/0x3000)=nil)
shmctl$IPC_RMID(r0, 0x0)
pipe(&(0x7f0000000280))
shmat(0x0, &(0x7f0000340000/0x3000)=nil, 0x7000)

07:04:46 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  176.949388][ T8269] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
07:04:46 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:46 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:46 executing program 4:
r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000040))

07:04:46 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:46 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
sendmmsg$inet(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0)

07:04:47 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x7})

07:04:47 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:47 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getpid()
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40442}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)

07:04:47 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:47 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:47 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioprio_set$uid(0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0)

07:04:47 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:47 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00')
preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x0)

07:04:47 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:47 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00')
preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000)

07:04:47 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:47 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2})
ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000340))

07:04:47 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:47 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:47 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:47 executing program 5:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0)
ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611)
sendfile(r0, r1, 0x0, 0x4000000000010046)

07:04:48 executing program 4:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaeb00aaaabb86dd6020920000140600fe8000f10000000000000000000000bb00000000000000000000ffffffffffff000000006b6d1ad3d184d60967"], 0x0)

07:04:48 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c)
connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c)
sendmmsg(r0, &(0x7f0000001980), 0x8c83086635fae290, 0x2000f760)

07:04:48 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:48 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:48 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:48 executing program 5:
socket$inet(0x2, 0x3, 0x19)
connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00')
preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000)

07:04:48 executing program 4:
socket$inet6(0xa, 0x1, 0x0)
creat(&(0x7f00000002c0)='./bus\x00', 0x0)
eventfd2(0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
pipe2(&(0x7f0000000100), 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
creat(&(0x7f00000002c0)='./bus\x00', 0x0)
r2 = socket$vsock_stream(0x28, 0x1, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={<r3=>0xffffffffffffffff})
ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000200)={'bridge0\x00', &(0x7f0000000140)=ANY=[@ANYRES64=r2]})

07:04:48 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0)
tkill(r0, 0x40)
write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe3, &(0x7f00000193c0)="d3d763180dee636b7be929f7f249b9740c9e57f43d26af000000008a58480aa4cefdda3611f88416f5bd2ceef2611ab2c8e87610d02b8832952dd136bd6f0200009f8ede56de940ab099e6e624c6ee6419fead426b4428662cc5c0dec9f0a8ffec0fe8274c7b8fc1c8065f756cf0ab216142b72937be93b353f082833e8c437425c6d69b38fdcde399c9ce8350a42ea0980e7ea1f7dec9e19108431387d49f3ed7c2495e497c075fc7eb5f98959792cc3a38a0a43cf58d843d660c2b0be4dd51e018b3e0dfeb9fc9aaa154236900fb667f7470acf85a6ad2d28e546899129f93da2d20"}}], 0x1c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

07:04:48 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:48 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:48 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:48 executing program 0:
getpid()
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:48 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:48 executing program 4:
r0 = socket$inet(0x2, 0x1, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_to_batadv\x00', 0x10)
connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10)

07:04:48 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:48 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:48 executing program 5:
inotify_init()
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00')
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
sendfile(r1, r0, 0x0, 0x4)

07:04:48 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:48 executing program 4:
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x0, 0x2, 0x9}, 0x20)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0)

07:04:51 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x24}}}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x39, &(0x7f0000000000)={@remote}, 0x20)
tkill(r1, 0x5)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'})
wait4(0x0, 0x0, 0x0, 0x0)

07:04:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:51 executing program 0:
mkdir(0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:51 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:51 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0)
ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x81, 0x0, [0xfffffffeffffffff]})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

07:04:51 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil})

07:04:51 executing program 0:
mkdir(0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:51 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r2, 0xffffffffffffffff)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:51 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0xc6ff]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

07:04:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:51 executing program 0:
mkdir(0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:51 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000080))

07:04:51 executing program 2:

07:04:51 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r2, 0xffffffffffffffff)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:51 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:51 executing program 3:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:51 executing program 4:
recvmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000000)=""/61, 0x3d}], 0x2}}], 0x1, 0x0, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept4$alg(r0, 0x0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000000c80), 0x4924924924924bd, 0x0)

07:04:51 executing program 5:

07:04:51 executing program 5:

07:04:51 executing program 2:

07:04:51 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:51 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r2, 0xffffffffffffffff)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:51 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:51 executing program 2:

07:04:52 executing program 4:

07:04:52 executing program 5:

07:04:52 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:52 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:52 executing program 2:

07:04:52 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:52 executing program 5:

07:04:52 executing program 4:

07:04:52 executing program 2:

07:04:52 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:52 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], 0x0, &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:52 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:52 executing program 4:

07:04:52 executing program 5:

07:04:52 executing program 2:

07:04:52 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:52 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], 0x0, &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:52 executing program 4:

07:04:52 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(0xffffffffffffffff, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:52 executing program 2:

07:04:52 executing program 5:

07:04:52 executing program 4:

07:04:52 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:52 executing program 2:

07:04:52 executing program 5:

07:04:52 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], 0x0, &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:52 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(0xffffffffffffffff, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:52 executing program 4:

07:04:52 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:52 executing program 5:

07:04:52 executing program 2:

07:04:52 executing program 4:

07:04:52 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(0xffffffffffffffff, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:52 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0))

07:04:52 executing program 5:

07:04:52 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:52 executing program 2:

07:04:52 executing program 4:

07:04:53 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:53 executing program 5:

07:04:53 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0))

07:04:53 executing program 4:

07:04:53 executing program 2:

07:04:53 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:53 executing program 2:

07:04:53 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:53 executing program 4:

07:04:53 executing program 5:

07:04:53 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0))

07:04:53 executing program 2:

07:04:53 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:53 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:53 executing program 4:

07:04:53 executing program 5:

07:04:53 executing program 2:

07:04:53 executing program 0:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:04:53 executing program 4:

07:04:53 executing program 1:
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r2 = dup2(r0, r1)
write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:53 executing program 5:

07:04:53 executing program 2:

07:04:53 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:53 executing program 4:

07:04:53 executing program 5:

07:04:53 executing program 1:
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r2 = dup2(r0, r1)
write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:53 executing program 2:

07:04:53 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:53 executing program 5:

07:04:53 executing program 4:

07:04:53 executing program 2:

07:04:53 executing program 1:
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r2 = dup2(r0, r1)
write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:53 executing program 5:

07:04:53 executing program 4:

07:04:53 executing program 2:

07:04:53 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:54 executing program 1:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:54 executing program 5:

07:04:54 executing program 4:

07:04:54 executing program 2:

07:04:54 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:54 executing program 1:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:54 executing program 4:

07:04:54 executing program 5:

07:04:54 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0)

07:04:54 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2000000002008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = gettid()
setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r3, 0x0, 0x0)
tkill(r3, 0x34)
wait4(0x0, 0x0, 0x0, 0x0)

07:04:54 executing program 5:
creat(&(0x7f0000000000)='./bus\x00', 0x0)
r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ftruncate(r1, 0x208200)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000280)='./bus\x00', 0x0)
sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, 0x0, 0x0)
creat(0x0, 0x0)
sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0)

07:04:54 executing program 0:

[  184.603145][   T28] audit: type=1326 audit(1592636694.348:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8665 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f89a code=0x0
07:04:54 executing program 0:

07:04:54 executing program 5:

07:04:54 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:54 executing program 1:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:54 executing program 5:

07:04:54 executing program 0:

07:04:54 executing program 5:

07:04:54 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:55 executing program 2:

07:04:57 executing program 4:

07:04:57 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:57 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:57 executing program 0:

07:04:57 executing program 5:

07:04:57 executing program 2:

07:04:57 executing program 5:

07:04:57 executing program 2:

07:04:57 executing program 0:

07:04:57 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:57 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:57 executing program 5:

07:04:57 executing program 4:

07:04:57 executing program 0:

07:04:57 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:57 executing program 2:

07:04:57 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_open_dev$tty1(0xc, 0x4, 0x1)
r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00')
sendfile(r2, r3, 0x0, 0x800000080004105)

07:04:57 executing program 0:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0)
stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400))

07:04:57 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:57 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:57 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:57 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:57 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:57 executing program 0:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:57 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:58 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:58 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:58 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:59 executing program 4:
getpid()
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x2, 0x3}}, 0x26)
read$midi(0xffffffffffffffff, 0x0, 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0))

07:04:59 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:04:59 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:59 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r1, r2)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:59 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

07:04:59 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 4 (fault-call:1 fault-nth:0):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:04:59 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  189.741674][ T8796] FAULT_INJECTION: forcing a failure.
[  189.741674][ T8796] name failslab, interval 1, probability 0, space 0, times 1
07:04:59 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  189.824221][ T8796] CPU: 1 PID: 8796 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  189.832497][ T8796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  189.842550][ T8796] Call Trace:
[  189.845838][ T8796]  dump_stack+0x188/0x20d
[  189.850187][ T8796]  should_fail.cold+0x5/0xa
[  189.854682][ T8796]  ? lock_downgrade+0x840/0x840
[  189.859525][ T8796]  ? fault_create_debugfs_attr+0x140/0x140
[  189.865317][ T8796]  should_failslab+0x5/0xf
[  189.869715][ T8796]  __kmalloc_track_caller+0x2d1/0x7a0
[  189.875070][ T8796]  ? strndup_user+0x70/0xe0
[  189.879553][ T8796]  ? vfs_write+0x161/0x5d0
[  189.883957][ T8796]  ? fput_many+0x2f/0x1a0
[  189.888273][ T8796]  memdup_user+0x22/0xd0
[  189.892506][ T8796]  strndup_user+0x70/0xe0
[  189.896825][ T8796]  __x64_sys_mount+0xe6/0x230
[  189.901494][ T8796]  do_syscall_64+0xf6/0x7d0
[  189.905985][ T8796]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  189.911852][ T8796] RIP: 0033:0x45ca59
[  189.915728][ T8796] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  189.935311][ T8796] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  189.943699][ T8796] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  189.951649][ T8796] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  189.959598][ T8796] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
07:04:59 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:04:59 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:04:59 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

[  189.967546][ T8796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  189.975494][ T8796] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:04:59 executing program 4 (fault-call:1 fault-nth:1):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  190.222673][ T8812] FAULT_INJECTION: forcing a failure.
[  190.222673][ T8812] name failslab, interval 1, probability 0, space 0, times 0
07:05:00 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  190.294750][ T8812] CPU: 0 PID: 8812 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  190.303036][ T8812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  190.313094][ T8812] Call Trace:
[  190.316396][ T8812]  dump_stack+0x188/0x20d
[  190.320739][ T8812]  should_fail.cold+0x5/0xa
[  190.325244][ T8812]  ? lock_downgrade+0x840/0x840
[  190.330102][ T8812]  ? fault_create_debugfs_attr+0x140/0x140
[  190.335921][ T8812]  should_failslab+0x5/0xf
[  190.340347][ T8812]  __kmalloc_track_caller+0x2d1/0x7a0
[  190.345727][ T8812]  ? strndup_user+0x70/0xe0
[  190.350238][ T8812]  ? __might_fault+0x190/0x1d0
[  190.355014][ T8812]  ? _copy_from_user+0x13c/0x1a0
[  190.359968][ T8812]  memdup_user+0x22/0xd0
[  190.364219][ T8812]  strndup_user+0x70/0xe0
[  190.368557][ T8812]  __x64_sys_mount+0x12f/0x230
[  190.373330][ T8812]  do_syscall_64+0xf6/0x7d0
[  190.377842][ T8812]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  190.383731][ T8812] RIP: 0033:0x45ca59
[  190.387625][ T8812] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  190.407232][ T8812] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  190.415650][ T8812] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  190.423631][ T8812] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  190.431783][ T8812] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
07:05:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  190.439774][ T8812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  190.447859][ T8812] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:00 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

07:05:00 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 2:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:00 executing program 4 (fault-call:1 fault-nth:2):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:00 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:00 executing program 2:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sndseq(0xffffff9c, 0x0, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:00 executing program 5:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 2:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:00 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
socket(0x0, 0x0, 0x0)

[  191.010176][ T8862] FAULT_INJECTION: forcing a failure.
[  191.010176][ T8862] name failslab, interval 1, probability 0, space 0, times 0
[  191.075054][ T8862] CPU: 1 PID: 8862 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  191.083331][ T8862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  191.093403][ T8862] Call Trace:
[  191.096706][ T8862]  dump_stack+0x188/0x20d
[  191.101053][ T8862]  should_fail.cold+0x5/0xa
[  191.105565][ T8862]  ? lock_downgrade+0x840/0x840
[  191.110421][ T8862]  ? fault_create_debugfs_attr+0x140/0x140
[  191.116233][ T8862]  ? get_pid_task+0x116/0x200
[  191.120920][ T8862]  should_failslab+0x5/0xf
07:05:00 executing program 5:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  191.125338][ T8862]  kmem_cache_alloc+0x29b/0x740
[  191.130201][ T8862]  getname_flags+0xd2/0x5b0
[  191.134713][ T8862]  user_path_at_empty+0x2a/0x50
[  191.139567][ T8862]  do_mount+0x132/0x1b40
[  191.143817][ T8862]  ? copy_mount_string+0x40/0x40
[  191.148760][ T8862]  ? __might_fault+0x190/0x1d0
[  191.153527][ T8862]  ? _copy_from_user+0x13c/0x1a0
[  191.158469][ T8862]  ? memdup_user+0x7c/0xd0
[  191.162890][ T8862]  __x64_sys_mount+0x18f/0x230
[  191.167661][ T8862]  do_syscall_64+0xf6/0x7d0
07:05:00 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
socket(0x0, 0x0, 0x0)

[  191.172175][ T8862]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  191.178066][ T8862] RIP: 0033:0x45ca59
[  191.181969][ T8862] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  191.201572][ T8862] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  191.209991][ T8862] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  191.217964][ T8862] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  191.225939][ T8862] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  191.233914][ T8862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  191.241886][ T8862] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:01 executing program 4 (fault-call:1 fault-nth:3):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:01 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:01 executing program 5:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:01 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:01 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:01 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:01 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:01 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:01 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

[  191.712587][ T8898] FAULT_INJECTION: forcing a failure.
[  191.712587][ T8898] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  191.725827][ T8898] CPU: 1 PID: 8898 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  191.734062][ T8898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  191.744115][ T8898] Call Trace:
[  191.747454][ T8898]  dump_stack+0x188/0x20d
[  191.751799][ T8898]  should_fail.cold+0x5/0xa
[  191.756314][ T8898]  ? fault_create_debugfs_attr+0x140/0x140
[  191.762128][ T8898]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  191.768109][ T8898]  ? mark_lock+0x11f/0xdd0
[  191.772531][ T8898]  ? stack_trace_save+0x8c/0xc0
[  191.777392][ T8898]  __alloc_pages_nodemask+0x17a/0x810
[  191.782767][ T8898]  ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640
[  191.789530][ T8898]  ? find_held_lock+0x2d/0x110
[  191.794305][ T8898]  ? lock_downgrade+0x840/0x840
[  191.799165][ T8898]  cache_grow_begin+0x8c/0xc10
[  191.803935][ T8898]  ? cache_alloc_pfmemalloc+0x1e/0x140
[  191.809397][ T8898]  kmem_cache_alloc+0x670/0x740
[  191.814258][ T8898]  getname_flags+0xd2/0x5b0
[  191.818772][ T8898]  user_path_at_empty+0x2a/0x50
[  191.823630][ T8898]  do_mount+0x132/0x1b40
[  191.827885][ T8898]  ? copy_mount_string+0x40/0x40
[  191.832832][ T8898]  ? __might_fault+0x190/0x1d0
[  191.837601][ T8898]  ? _copy_from_user+0x13c/0x1a0
[  191.842556][ T8898]  ? memdup_user+0x7c/0xd0
[  191.846979][ T8898]  __x64_sys_mount+0x18f/0x230
[  191.851747][ T8898]  do_syscall_64+0xf6/0x7d0
[  191.856258][ T8898]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
07:05:01 executing program 0:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:01 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:01 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

[  191.862153][ T8898] RIP: 0033:0x45ca59
[  191.866049][ T8898] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  191.885652][ T8898] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  191.894074][ T8898] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  191.902135][ T8898] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  191.910111][ T8898] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  191.918086][ T8898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  191.926060][ T8898] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:01 executing program 4 (fault-call:1 fault-nth:4):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:01 executing program 0:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:01 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:01 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:01 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:01 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:02 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:02 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:02 executing program 0:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

[  192.231882][ T8926] FAULT_INJECTION: forcing a failure.
[  192.231882][ T8926] name failslab, interval 1, probability 0, space 0, times 0
[  192.310741][ T8926] CPU: 0 PID: 8926 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  192.319030][ T8926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  192.329087][ T8926] Call Trace:
[  192.332391][ T8926]  dump_stack+0x188/0x20d
[  192.336737][ T8926]  should_fail.cold+0x5/0xa
[  192.341288][ T8926]  ? fault_create_debugfs_attr+0x140/0x140
[  192.347110][ T8926]  should_failslab+0x5/0xf
[  192.351530][ T8926]  __kmalloc+0x2d9/0x7a0
[  192.355790][ T8926]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  192.361777][ T8926]  ? tomoyo_encode2.part.0+0xec/0x3b0
[  192.367151][ T8926]  ? mark_lock+0x11f/0xdd0
[  192.371579][ T8926]  tomoyo_encode2.part.0+0xec/0x3b0
[  192.376805][ T8926]  ? do_syscall_64+0xf6/0x7d0
[  192.381489][ T8926]  tomoyo_encode+0x28/0x50
[  192.385910][ T8926]  tomoyo_mount_acl+0xe0/0x840
[  192.390690][ T8926]  ? tomoyo_check_mount_acl+0x1a0/0x1a0
[  192.396241][ T8926]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  192.402224][ T8926]  ? do_raw_spin_unlock+0x171/0x260
[  192.407430][ T8926]  ? trace_hardirqs_off+0x50/0x220
[  192.412539][ T8926]  ? debug_smp_processor_id+0x2f/0x185
[  192.418013][ T8926]  ? putname+0xe1/0x120
[  192.422172][ T8926]  ? tomoyo_profile+0x42/0x50
[  192.426852][ T8926]  ? tomoyo_get_mode.part.0+0x127/0x160
[  192.432411][ T8926]  tomoyo_mount_permission+0x151/0x3f0
[  192.437875][ T8926]  ? tomoyo_mount_permission+0xfa/0x3f0
[  192.443425][ T8926]  ? tomoyo_mount_acl+0x840/0x840
[  192.448455][ T8926]  ? __phys_addr_symbol+0x2c/0x70
[  192.453502][ T8926]  security_sb_mount+0x82/0xc0
[  192.458274][ T8926]  do_mount+0x1b4/0x1b40
[  192.462523][ T8926]  ? copy_mount_string+0x40/0x40
[  192.467458][ T8926]  ? __might_fault+0x190/0x1d0
[  192.472224][ T8926]  ? _copy_from_user+0x13c/0x1a0
[  192.477344][ T8926]  ? memdup_user+0x7c/0xd0
[  192.481800][ T8926]  __x64_sys_mount+0x18f/0x230
[  192.486571][ T8926]  do_syscall_64+0xf6/0x7d0
[  192.491081][ T8926]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  192.496973][ T8926] RIP: 0033:0x45ca59
[  192.500884][ T8926] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  192.520489][ T8926] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  192.528904][ T8926] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  192.536877][ T8926] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  192.544847][ T8926] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  192.552821][ T8926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
07:05:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:02 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

[  192.560795][ T8926] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:02 executing program 4 (fault-call:1 fault-nth:5):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:02 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:02 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, 0x0, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:02 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:02 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:02 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

07:05:02 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:02 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:02 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, 0x0, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  192.863642][ T8960] FAULT_INJECTION: forcing a failure.
[  192.863642][ T8960] name failslab, interval 1, probability 0, space 0, times 0
07:05:02 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

[  192.974053][ T8960] CPU: 0 PID: 8960 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  192.982328][ T8960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  192.992390][ T8960] Call Trace:
[  192.995704][ T8960]  dump_stack+0x188/0x20d
[  193.000060][ T8960]  should_fail.cold+0x5/0xa
[  193.004590][ T8960]  ? fault_create_debugfs_attr+0x140/0x140
[  193.010412][ T8960]  should_failslab+0x5/0xf
[  193.014832][ T8960]  __kmalloc+0x2d9/0x7a0
[  193.019080][ T8960]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  193.025059][ T8960]  ? tomoyo_realpath_from_path+0xc2/0x620
[  193.030782][ T8960]  ? tomoyo_encode2.part.0+0xec/0x3b0
[  193.036158][ T8960]  ? mark_lock+0x11f/0xdd0
[  193.040583][ T8960]  tomoyo_realpath_from_path+0xc2/0x620
[  193.046138][ T8960]  ? tomoyo_fill_path_info+0x22e/0x420
[  193.051604][ T8960]  tomoyo_mount_acl+0x149/0x840
[  193.056472][ T8960]  ? tomoyo_check_mount_acl+0x1a0/0x1a0
[  193.062025][ T8960]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  193.068012][ T8960]  ? trace_hardirqs_off+0x50/0x220
[  193.073129][ T8960]  ? debug_smp_processor_id+0x2f/0x185
[  193.078612][ T8960]  ? putname+0xe1/0x120
[  193.082776][ T8960]  ? tomoyo_profile+0x42/0x50
[  193.087455][ T8960]  ? tomoyo_get_mode.part.0+0x127/0x160
[  193.093011][ T8960]  tomoyo_mount_permission+0x151/0x3f0
[  193.098475][ T8960]  ? tomoyo_mount_permission+0xfa/0x3f0
[  193.104025][ T8960]  ? tomoyo_mount_acl+0x840/0x840
[  193.109053][ T8960]  ? __phys_addr_symbol+0x2c/0x70
[  193.114103][ T8960]  security_sb_mount+0x82/0xc0
[  193.118876][ T8960]  do_mount+0x1b4/0x1b40
[  193.123137][ T8960]  ? copy_mount_string+0x40/0x40
[  193.128084][ T8960]  ? __might_fault+0x190/0x1d0
[  193.132862][ T8960]  ? _copy_from_user+0x13c/0x1a0
[  193.137817][ T8960]  ? memdup_user+0x7c/0xd0
[  193.142247][ T8960]  __x64_sys_mount+0x18f/0x230
[  193.147027][ T8960]  do_syscall_64+0xf6/0x7d0
[  193.151538][ T8960]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  193.157428][ T8960] RIP: 0033:0x45ca59
[  193.161323][ T8960] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  193.180932][ T8960] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  193.189350][ T8960] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  193.197323][ T8960] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  193.205297][ T8960] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  193.213270][ T8960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  193.221244][ T8960] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:03 executing program 4 (fault-call:1 fault-nth:6):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:03 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0)

07:05:03 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:03 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

07:05:03 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, 0x0, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

[  193.275829][ T8960] ERROR: Out of memory at tomoyo_realpath_from_path.
07:05:03 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:03 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

07:05:03 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

[  193.445649][ T8989] FAULT_INJECTION: forcing a failure.
[  193.445649][ T8989] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  193.458901][ T8989] CPU: 1 PID: 8989 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  193.467145][ T8989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  193.477207][ T8989] Call Trace:
[  193.480508][ T8989]  dump_stack+0x188/0x20d
[  193.484852][ T8989]  should_fail.cold+0x5/0xa
[  193.489365][ T8989]  ? __x64_sys_mount+0x18f/0x230
07:05:03 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  193.494314][ T8989]  ? fault_create_debugfs_attr+0x140/0x140
[  193.500128][ T8989]  ? lock_downgrade+0x840/0x840
[  193.504986][ T8989]  ? unwind_next_frame+0x105a/0x1df0
[  193.510279][ T8989]  __alloc_pages_nodemask+0x17a/0x810
[  193.515668][ T8989]  ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640
[  193.522454][ T8989]  cache_grow_begin+0x8c/0xc10
[  193.527223][ T8989]  ? cache_alloc_pfmemalloc+0x1e/0x140
[  193.532691][ T8989]  __kmalloc+0x6dc/0x7a0
[  193.536940][ T8989]  ? tomoyo_realpath_from_path+0xc2/0x620
[  193.542665][ T8989]  ? mark_lock+0x11f/0xdd0
[  193.547090][ T8989]  tomoyo_realpath_from_path+0xc2/0x620
[  193.552641][ T8989]  ? tomoyo_fill_path_info+0x22e/0x420
[  193.558113][ T8989]  tomoyo_mount_acl+0x149/0x840
[  193.562980][ T8989]  ? tomoyo_check_mount_acl+0x1a0/0x1a0
[  193.568536][ T8989]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  193.574526][ T8989]  ? trace_hardirqs_off+0x50/0x220
[  193.579647][ T8989]  ? debug_smp_processor_id+0x2f/0x185
[  193.585124][ T8989]  ? putname+0xe1/0x120
[  193.589284][ T8989]  ? tomoyo_profile+0x42/0x50
[  193.593968][ T8989]  ? tomoyo_get_mode.part.0+0x127/0x160
[  193.599527][ T8989]  tomoyo_mount_permission+0x151/0x3f0
[  193.604988][ T8989]  ? tomoyo_mount_permission+0xfa/0x3f0
[  193.610540][ T8989]  ? tomoyo_mount_acl+0x840/0x840
[  193.615569][ T8989]  ? __phys_addr_symbol+0x2c/0x70
[  193.620619][ T8989]  security_sb_mount+0x82/0xc0
[  193.625389][ T8989]  do_mount+0x1b4/0x1b40
[  193.629645][ T8989]  ? copy_mount_string+0x40/0x40
[  193.634590][ T8989]  ? __might_fault+0x190/0x1d0
[  193.639360][ T8989]  ? _copy_from_user+0x13c/0x1a0
07:05:03 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  193.644306][ T8989]  ? memdup_user+0x7c/0xd0
[  193.648735][ T8989]  __x64_sys_mount+0x18f/0x230
[  193.653505][ T8989]  do_syscall_64+0xf6/0x7d0
[  193.658015][ T8989]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  193.663905][ T8989] RIP: 0033:0x45ca59
[  193.667802][ T8989] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  193.687407][ T8989] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  193.695827][ T8989] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  193.703810][ T8989] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  193.711785][ T8989] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  193.719761][ T8989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  193.727825][ T8989] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:03 executing program 4 (fault-call:1 fault-nth:7):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:03 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:03 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:03 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:03 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:03 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

07:05:03 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:03 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:03 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:03 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)

[  194.026510][ T9023] FAULT_INJECTION: forcing a failure.
[  194.026510][ T9023] name failslab, interval 1, probability 0, space 0, times 0
07:05:03 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  194.137296][ T9023] CPU: 1 PID: 9023 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  194.145573][ T9023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  194.155631][ T9023] Call Trace:
[  194.158942][ T9023]  dump_stack+0x188/0x20d
[  194.163286][ T9023]  should_fail.cold+0x5/0xa
[  194.167801][ T9023]  ? fault_create_debugfs_attr+0x140/0x140
[  194.173614][ T9023]  ? get_fs_root_and_pwd_rcu.isra.0+0x3a0/0x3a0
[  194.179867][ T9023]  should_failslab+0x5/0xf
[  194.184284][ T9023]  __kmalloc+0x2d9/0x7a0
[  194.188535][ T9023]  ? tomoyo_encode2.part.0+0xec/0x3b0
[  194.193911][ T9023]  ? d_absolute_path+0x10c/0x160
[  194.198853][ T9023]  ? __d_path+0x140/0x140
[  194.203272][ T9023]  tomoyo_encode2.part.0+0xec/0x3b0
[  194.208477][ T9023]  tomoyo_encode+0x28/0x50
[  194.212893][ T9023]  tomoyo_realpath_from_path+0x184/0x620
[  194.218535][ T9023]  tomoyo_mount_acl+0x149/0x840
[  194.223386][ T9023]  ? tomoyo_check_mount_acl+0x1a0/0x1a0
[  194.228926][ T9023]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  194.231479][    T0] NOHZ: local_softirq_pending 08
[  194.234904][ T9023]  ? trace_hardirqs_off+0x50/0x220
[  194.244949][ T9023]  ? debug_smp_processor_id+0x2f/0x185
[  194.250427][ T9023]  ? putname+0xe1/0x120
[  194.254591][ T9023]  ? tomoyo_profile+0x42/0x50
[  194.259255][ T9023]  ? tomoyo_get_mode.part.0+0x127/0x160
[  194.264785][ T9023]  tomoyo_mount_permission+0x151/0x3f0
[  194.270233][ T9023]  ? tomoyo_mount_permission+0xfa/0x3f0
[  194.275783][ T9023]  ? tomoyo_mount_acl+0x840/0x840
[  194.280807][ T9023]  ? __phys_addr_symbol+0x2c/0x70
[  194.285856][ T9023]  security_sb_mount+0x82/0xc0
[  194.290759][ T9023]  do_mount+0x1b4/0x1b40
[  194.295011][ T9023]  ? copy_mount_string+0x40/0x40
[  194.299954][ T9023]  ? __might_fault+0x190/0x1d0
[  194.304721][ T9023]  ? _copy_from_user+0x13c/0x1a0
[  194.309668][ T9023]  ? memdup_user+0x7c/0xd0
[  194.314088][ T9023]  __x64_sys_mount+0x18f/0x230
[  194.318857][ T9023]  do_syscall_64+0xf6/0x7d0
[  194.323366][ T9023]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  194.329258][ T9023] RIP: 0033:0x45ca59
[  194.333152][ T9023] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  194.352754][ T9023] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  194.361168][ T9023] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  194.369147][ T9023] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  194.377146][ T9023] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  194.385122][ T9023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  194.393098][ T9023] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
[  194.408459][ T9023] ERROR: Out of memory at tomoyo_realpath_from_path.
07:05:04 executing program 4 (fault-call:1 fault-nth:8):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:04 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:04 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:04 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

07:05:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:04 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:04 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:04 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

07:05:04 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  194.582714][ T9050] FAULT_INJECTION: forcing a failure.
[  194.582714][ T9050] name failslab, interval 1, probability 0, space 0, times 0
07:05:04 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

[  194.685149][ T9050] CPU: 1 PID: 9050 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  194.693465][ T9050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  194.703528][ T9050] Call Trace:
[  194.706845][ T9050]  dump_stack+0x188/0x20d
[  194.711199][ T9050]  should_fail.cold+0x5/0xa
[  194.715717][ T9050]  ? fault_create_debugfs_attr+0x140/0x140
[  194.721530][ T9050]  ? find_held_lock+0x2d/0x110
[  194.726305][ T9050]  should_failslab+0x5/0xf
[  194.730723][ T9050]  __kmalloc+0x2d9/0x7a0
[  194.734970][ T9050]  ? lockdep_hardirqs_on_prepare+0x3a2/0x590
[  194.740949][ T9050]  ? tomoyo_encode2.part.0+0x2f4/0x3b0
[  194.746456][ T9050]  tomoyo_encode2.part.0+0x2f4/0x3b0
[  194.751761][ T9050]  tomoyo_encode+0x28/0x50
[  194.756195][ T9050]  tomoyo_mount_acl+0x320/0x840
[  194.761061][ T9050]  ? tomoyo_check_mount_acl+0x1a0/0x1a0
[  194.766614][ T9050]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  194.772605][ T9050]  ? trace_hardirqs_off+0x50/0x220
[  194.777718][ T9050]  ? debug_smp_processor_id+0x2f/0x185
[  194.783198][ T9050]  ? putname+0xe1/0x120
[  194.787358][ T9050]  ? tomoyo_profile+0x42/0x50
[  194.792039][ T9050]  ? tomoyo_get_mode.part.0+0x127/0x160
[  194.797592][ T9050]  tomoyo_mount_permission+0x151/0x3f0
[  194.803057][ T9050]  ? tomoyo_mount_permission+0xfa/0x3f0
[  194.808613][ T9050]  ? tomoyo_mount_acl+0x840/0x840
[  194.813641][ T9050]  ? __phys_addr_symbol+0x2c/0x70
[  194.818690][ T9050]  security_sb_mount+0x82/0xc0
[  194.823463][ T9050]  do_mount+0x1b4/0x1b40
[  194.827713][ T9050]  ? copy_mount_string+0x40/0x40
[  194.832656][ T9050]  ? __might_fault+0x190/0x1d0
[  194.837423][ T9050]  ? _copy_from_user+0x13c/0x1a0
[  194.842371][ T9050]  ? memdup_user+0x7c/0xd0
[  194.846800][ T9050]  __x64_sys_mount+0x18f/0x230
[  194.851569][ T9050]  do_syscall_64+0xf6/0x7d0
[  194.856090][ T9050]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  194.861977][ T9050] RIP: 0033:0x45ca59
[  194.865871][ T9050] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  194.885470][ T9050] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  194.893881][ T9050] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  194.901838][ T9050] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  194.909804][ T9050] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  194.917775][ T9050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  194.925755][ T9050] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:04 executing program 4 (fault-call:1 fault-nth:9):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:04 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:04 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:04 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

07:05:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:04 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:04 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:04 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:04 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

[  195.137052][ T9079] FAULT_INJECTION: forcing a failure.
[  195.137052][ T9079] name failslab, interval 1, probability 0, space 0, times 0
07:05:04 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:04 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)
socket(0x0, 0x0, 0x0)

[  195.179887][ T9079] CPU: 1 PID: 9079 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  195.188162][ T9079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  195.198219][ T9079] Call Trace:
[  195.201519][ T9079]  dump_stack+0x188/0x20d
[  195.205865][ T9079]  should_fail.cold+0x5/0xa
[  195.210429][ T9079]  ? fault_create_debugfs_attr+0x140/0x140
[  195.216244][ T9079]  should_failslab+0x5/0xf
[  195.220669][ T9079]  kmem_cache_alloc_trace+0x2d0/0x7d0
[  195.226051][ T9079]  ? put_dec+0xd0/0xd0
[  195.230124][ T9079]  ? format_decode+0x230/0xad0
[  195.234897][ T9079]  tomoyo_init_log+0x18a/0x1e50
[  195.239755][ T9079]  ? security_sb_mount+0x82/0xc0
[  195.244705][ T9079]  ? __x64_sys_mount+0x18f/0x230
[  195.249647][ T9079]  ? __sanitizer_cov_trace_switch+0x45/0x70
[  195.255554][ T9079]  ? common_lsm_audit+0x1ce0/0x1ce0
[  195.260753][ T9079]  ? __sanitizer_cov_trace_switch+0x45/0x70
[  195.266645][ T9079]  ? tomoyo_profile+0x42/0x50
[  195.271327][ T9079]  ? tomoyo_domain_quota_is_ok+0x2d5/0x500
07:05:05 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  195.277143][ T9079]  tomoyo_supervisor+0x32c/0xf00
[  195.282089][ T9079]  ? tomoyo_profile+0x50/0x50
[  195.286775][ T9079]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  195.292327][ T9079]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  195.298314][ T9079]  ? __kasan_kmalloc.constprop.0+0xbf/0xd0
[  195.304142][ T9079]  ? tomoyo_check_mount_acl+0x5a/0x1a0
[  195.309613][ T9079]  ? tomoyo_check_acl+0x2e5/0x3e0
[  195.314652][ T9079]  tomoyo_mount_acl+0x51d/0x840
[  195.319520][ T9079]  ? tomoyo_check_mount_acl+0x1a0/0x1a0
[  195.325070][ T9079]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  195.331064][ T9079]  ? debug_smp_processor_id+0x2f/0x185
[  195.336576][ T9079]  ? putname+0xe1/0x120
[  195.340739][ T9079]  ? tomoyo_profile+0x42/0x50
[  195.345422][ T9079]  ? tomoyo_get_mode.part.0+0x127/0x160
[  195.350972][ T9079]  tomoyo_mount_permission+0x151/0x3f0
[  195.356432][ T9079]  ? tomoyo_mount_permission+0xfa/0x3f0
[  195.361989][ T9079]  ? tomoyo_mount_acl+0x840/0x840
[  195.367030][ T9079]  ? __phys_addr_symbol+0x2c/0x70
[  195.372080][ T9079]  security_sb_mount+0x82/0xc0
[  195.376851][ T9079]  do_mount+0x1b4/0x1b40
[  195.381098][ T9079]  ? copy_mount_string+0x40/0x40
[  195.386042][ T9079]  ? __might_fault+0x190/0x1d0
[  195.390807][ T9079]  ? _copy_from_user+0x13c/0x1a0
[  195.395751][ T9079]  ? memdup_user+0x7c/0xd0
[  195.400181][ T9079]  __x64_sys_mount+0x18f/0x230
[  195.404950][ T9079]  do_syscall_64+0xf6/0x7d0
[  195.409455][ T9079]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  195.415343][ T9079] RIP: 0033:0x45ca59
[  195.419237][ T9079] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  195.438845][ T9079] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  195.447270][ T9079] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  195.455246][ T9079] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  195.463219][ T9079] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  195.471196][ T9079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  195.479175][ T9079] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:05 executing program 4 (fault-call:1 fault-nth:10):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:05 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, 0x0, 0x0)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:05 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:05 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:05 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:05 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, 0x0, 0x0)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:05 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:05 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, 0x0, 0x0)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:05 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

[  195.724813][ T9106] FAULT_INJECTION: forcing a failure.
[  195.724813][ T9106] name failslab, interval 1, probability 0, space 0, times 0
07:05:05 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  195.812803][ T9106] CPU: 1 PID: 9106 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  195.821080][ T9106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  195.831162][ T9106] Call Trace:
[  195.834445][ T9106]  dump_stack+0x188/0x20d
[  195.838767][ T9106]  should_fail.cold+0x5/0xa
[  195.843267][ T9106]  ? lock_downgrade+0x840/0x840
[  195.848112][ T9106]  ? fault_create_debugfs_attr+0x140/0x140
[  195.853913][ T9106]  should_failslab+0x5/0xf
[  195.858320][ T9106]  __kmalloc_track_caller+0x2d1/0x7a0
[  195.863669][ T9106]  ? vfs_parse_fs_string+0xc0/0x150
[  195.868846][ T9106]  ? __kasan_kmalloc.constprop.0+0xbf/0xd0
[  195.874646][ T9106]  kmemdup_nul+0x2d/0xa0
[  195.878876][ T9106]  vfs_parse_fs_string+0xc0/0x150
[  195.883879][ T9106]  ? vfs_parse_fs_param+0x570/0x570
[  195.889064][ T9106]  ? task_active_pid_ns+0xa1/0xe0
[  195.894072][ T9106]  ? alloc_fs_context+0x56c/0x880
[  195.899091][ T9106]  do_mount+0x111d/0x1b40
[  195.903403][ T9106]  ? copy_mount_string+0x40/0x40
[  195.908320][ T9106]  ? __might_fault+0x190/0x1d0
[  195.913063][ T9106]  ? _copy_from_user+0x13c/0x1a0
[  195.917985][ T9106]  ? memdup_user+0x7c/0xd0
[  195.922381][ T9106]  __x64_sys_mount+0x18f/0x230
[  195.927125][ T9106]  do_syscall_64+0xf6/0x7d0
[  195.931608][ T9106]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  195.937493][ T9106] RIP: 0033:0x45ca59
[  195.941377][ T9106] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
07:05:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)
socket(0x0, 0x0, 0x0)

[  195.960967][ T9106] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  195.969356][ T9106] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  195.977317][ T9106] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  195.985269][ T9106] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  195.993226][ T9106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  196.001175][ T9106] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:05 executing program 4 (fault-call:1 fault-nth:11):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:05 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:05 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:05 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:05 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:06 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:06 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:06 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  196.364109][ T9136] FAULT_INJECTION: forcing a failure.
[  196.364109][ T9136] name failslab, interval 1, probability 0, space 0, times 0
[  196.409666][ T9136] CPU: 1 PID: 9136 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  196.417939][ T9136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  196.428013][ T9136] Call Trace:
[  196.431328][ T9136]  dump_stack+0x188/0x20d
[  196.435688][ T9136]  should_fail.cold+0x5/0xa
[  196.440206][ T9136]  ? fault_create_debugfs_attr+0x140/0x140
[  196.446033][ T9136]  should_failslab+0x5/0xf
[  196.450456][ T9136]  __kmalloc+0x2d9/0x7a0
[  196.454714][ T9136]  ? prealloc_shrinker+0x9d/0x340
[  196.459757][ T9136]  ? lockdep_init_map_waits+0x26a/0x890
[  196.465322][ T9136]  prealloc_shrinker+0x9d/0x340
[  196.470187][ T9136]  alloc_super+0x819/0x9d0
[  196.474620][ T9136]  sget_fc+0x13f/0x790
[  196.478701][ T9136]  ? compare_single+0x10/0x10
[  196.483387][ T9136]  ? proc_parse_param+0x8a0/0x8a0
[  196.488418][ T9136]  vfs_get_super+0x6d/0x2d0
[  196.492931][ T9136]  vfs_get_tree+0x89/0x2f0
[  196.497356][ T9136]  do_mount+0x1306/0x1b40
[  196.501697][ T9136]  ? copy_mount_string+0x40/0x40
07:05:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

[  196.506639][ T9136]  ? __might_fault+0x190/0x1d0
[  196.511410][ T9136]  ? _copy_from_user+0x13c/0x1a0
[  196.516355][ T9136]  ? memdup_user+0x7c/0xd0
[  196.520780][ T9136]  __x64_sys_mount+0x18f/0x230
[  196.525559][ T9136]  do_syscall_64+0xf6/0x7d0
[  196.530072][ T9136]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  196.535963][ T9136] RIP: 0033:0x45ca59
[  196.539864][ T9136] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  196.559588][ T9136] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  196.568009][ T9136] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  196.575989][ T9136] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  196.583967][ T9136] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  196.591938][ T9136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  196.599917][ T9136] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:06 executing program 4 (fault-call:1 fault-nth:12):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:06 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:06 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:06 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:06 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:06 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(0xffffffffffffffff, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

[  196.804020][ T9158] FAULT_INJECTION: forcing a failure.
[  196.804020][ T9158] name failslab, interval 1, probability 0, space 0, times 0
[  196.875226][ T9158] CPU: 0 PID: 9158 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  196.883500][ T9158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  196.893558][ T9158] Call Trace:
[  196.896856][ T9158]  dump_stack+0x188/0x20d
[  196.901204][ T9158]  should_fail.cold+0x5/0xa
[  196.905713][ T9158]  ? lock_downgrade+0x840/0x840
[  196.910601][ T9158]  ? fault_create_debugfs_attr+0x140/0x140
[  196.916452][ T9158]  should_failslab+0x5/0xf
07:05:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:06 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(0xffffffffffffffff, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  196.920877][ T9158]  kmem_cache_alloc_trace+0x2d0/0x7d0
[  196.926254][ T9158]  ? lock_downgrade+0x840/0x840
[  196.931112][ T9158]  ? do_raw_spin_lock+0x129/0x2e0
[  196.936149][ T9158]  alloc_super+0x52/0x9d0
[  196.940489][ T9158]  sget_fc+0x13f/0x790
[  196.944565][ T9158]  ? compare_single+0x10/0x10
[  196.949251][ T9158]  ? proc_parse_param+0x8a0/0x8a0
[  196.954281][ T9158]  vfs_get_super+0x6d/0x2d0
[  196.958792][ T9158]  vfs_get_tree+0x89/0x2f0
[  196.963207][ T9158]  do_mount+0x1306/0x1b40
[  196.967542][ T9158]  ? copy_mount_string+0x40/0x40
07:05:06 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

[  196.972485][ T9158]  ? __might_fault+0x190/0x1d0
[  196.977255][ T9158]  ? _copy_from_user+0x13c/0x1a0
[  196.982205][ T9158]  ? memdup_user+0x7c/0xd0
[  196.986630][ T9158]  __x64_sys_mount+0x18f/0x230
[  196.991404][ T9158]  do_syscall_64+0xf6/0x7d0
[  196.995919][ T9158]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  197.001810][ T9158] RIP: 0033:0x45ca59
[  197.005701][ T9158] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  197.025350][ T9158] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  197.033770][ T9158] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  197.041751][ T9158] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  197.049730][ T9158] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  197.057708][ T9158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  197.065692][ T9158] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:06 executing program 4 (fault-call:1 fault-nth:13):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:06 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:06 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:06 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:06 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(0xffffffffffffffff, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  197.263069][ T9194] FAULT_INJECTION: forcing a failure.
[  197.263069][ T9194] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  197.276304][ T9194] CPU: 0 PID: 9194 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  197.284543][ T9194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  197.294605][ T9194] Call Trace:
[  197.297910][ T9194]  dump_stack+0x188/0x20d
[  197.302259][ T9194]  should_fail.cold+0x5/0xa
[  197.306776][ T9194]  ? fault_create_debugfs_attr+0x140/0x140
[  197.312591][ T9194]  ? lockdep_hardirqs_on_prepare+0x590/0x590
[  197.318580][ T9194]  ? __lock_acquire+0x2224/0x48a0
[  197.323615][ T9194]  __alloc_pages_nodemask+0x17a/0x810
[  197.329003][ T9194]  ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640
[  197.335770][ T9194]  ? find_held_lock+0x2d/0x110
[  197.340550][ T9194]  ? lock_downgrade+0x840/0x840
[  197.345412][ T9194]  cache_grow_begin+0x8c/0xc10
[  197.350181][ T9194]  ? cache_alloc_pfmemalloc+0x1e/0x140
[  197.355645][ T9194]  kmem_cache_alloc_trace+0x6ed/0x7d0
[  197.361027][ T9194]  ? do_raw_spin_lock+0x129/0x2e0
[  197.366057][ T9194]  alloc_super+0x52/0x9d0
[  197.370401][ T9194]  sget_fc+0x13f/0x790
[  197.374476][ T9194]  ? compare_single+0x10/0x10
[  197.379161][ T9194]  ? proc_parse_param+0x8a0/0x8a0
[  197.384189][ T9194]  vfs_get_super+0x6d/0x2d0
[  197.388703][ T9194]  vfs_get_tree+0x89/0x2f0
[  197.393125][ T9194]  do_mount+0x1306/0x1b40
[  197.397464][ T9194]  ? copy_mount_string+0x40/0x40
[  197.402403][ T9194]  ? __might_fault+0x190/0x1d0
[  197.407168][ T9194]  ? _copy_from_user+0x13c/0x1a0
[  197.412112][ T9194]  ? memdup_user+0x7c/0xd0
[  197.416535][ T9194]  __x64_sys_mount+0x18f/0x230
[  197.421307][ T9194]  do_syscall_64+0xf6/0x7d0
[  197.425816][ T9194]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  197.431708][ T9194] RIP: 0033:0x45ca59
[  197.435603][ T9194] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  197.455210][ T9194] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  197.463744][ T9194] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  197.471738][ T9194] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  197.479803][ T9194] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  197.487779][ T9194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  197.495756][ T9194] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:07 executing program 4 (fault-call:1 fault-nth:14):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

07:05:07 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

07:05:07 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r2, 0xffffffffffffffff)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:07 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x4c}}, 0x0)

07:05:07 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

[  197.651668][ T9206] FAULT_INJECTION: forcing a failure.
[  197.651668][ T9206] name failslab, interval 1, probability 0, space 0, times 0
[  197.706566][ T9206] CPU: 0 PID: 9206 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  197.714829][ T9206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  197.724888][ T9206] Call Trace:
[  197.728190][ T9206]  dump_stack+0x188/0x20d
[  197.732535][ T9206]  should_fail.cold+0x5/0xa
[  197.737049][ T9206]  ? fault_create_debugfs_attr+0x140/0x140
[  197.742878][ T9206]  should_failslab+0x5/0xf
[  197.747301][ T9206]  __kmalloc+0x2d9/0x7a0
[  197.751549][ T9206]  ? prealloc_shrinker+0x9d/0x340
07:05:07 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

07:05:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

[  197.756579][ T9206]  ? lockdep_init_map_waits+0x26a/0x890
[  197.762134][ T9206]  prealloc_shrinker+0x9d/0x340
[  197.766993][ T9206]  alloc_super+0x819/0x9d0
[  197.771417][ T9206]  sget_fc+0x13f/0x790
[  197.775501][ T9206]  ? compare_single+0x10/0x10
[  197.780183][ T9206]  ? proc_parse_param+0x8a0/0x8a0
[  197.785212][ T9206]  vfs_get_super+0x6d/0x2d0
[  197.789724][ T9206]  vfs_get_tree+0x89/0x2f0
[  197.794147][ T9206]  do_mount+0x1306/0x1b40
[  197.798490][ T9206]  ? copy_mount_string+0x40/0x40
07:05:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

[  197.803435][ T9206]  ? __might_fault+0x190/0x1d0
[  197.808203][ T9206]  ? _copy_from_user+0x13c/0x1a0
[  197.813157][ T9206]  ? memdup_user+0x7c/0xd0
[  197.817582][ T9206]  __x64_sys_mount+0x18f/0x230
[  197.822350][ T9206]  do_syscall_64+0xf6/0x7d0
[  197.826863][ T9206]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  197.832752][ T9206] RIP: 0033:0x45ca59
[  197.836644][ T9206] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
07:05:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:07 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

[  197.856251][ T9206] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  197.864669][ T9206] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  197.872735][ T9206] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  197.880818][ T9206] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  197.888798][ T9206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  197.896777][ T9206] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:07 executing program 4 (fault-call:1 fault-nth:15):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:07 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r2, 0xffffffffffffffff)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:07 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:07 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

07:05:07 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0)

07:05:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

[  198.180829][ T9241] FAULT_INJECTION: forcing a failure.
[  198.180829][ T9241] name failslab, interval 1, probability 0, space 0, times 0
[  198.197544][ T9241] CPU: 1 PID: 9241 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  198.205816][ T9241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  198.215874][ T9241] Call Trace:
[  198.219168][ T9241]  dump_stack+0x188/0x20d
[  198.223507][ T9241]  should_fail.cold+0x5/0xa
[  198.228022][ T9241]  ? fault_create_debugfs_attr+0x140/0x140
[  198.233845][ T9241]  should_failslab+0x5/0xf
[  198.238270][ T9241]  kmem_cache_alloc_node_trace+0x27c/0x790
[  198.244090][ T9241]  ? __kmalloc+0x62f/0x7a0
[  198.248516][ T9241]  __kmalloc_node+0x38/0x60
[  198.253026][ T9241]  kvmalloc_node+0x61/0xf0
[  198.257451][ T9241]  __list_lru_init+0x50e/0x780
[  198.262223][ T9241]  alloc_super+0x86a/0x9d0
[  198.266651][ T9241]  sget_fc+0x13f/0x790
[  198.270734][ T9241]  ? compare_single+0x10/0x10
[  198.275413][ T9241]  ? proc_parse_param+0x8a0/0x8a0
[  198.280438][ T9241]  vfs_get_super+0x6d/0x2d0
[  198.284952][ T9241]  vfs_get_tree+0x89/0x2f0
[  198.289401][ T9241]  do_mount+0x1306/0x1b40
[  198.293741][ T9241]  ? copy_mount_string+0x40/0x40
[  198.298682][ T9241]  ? __might_fault+0x190/0x1d0
[  198.303467][ T9241]  ? _copy_from_user+0x13c/0x1a0
[  198.308420][ T9241]  ? memdup_user+0x7c/0xd0
[  198.312844][ T9241]  __x64_sys_mount+0x18f/0x230
[  198.317619][ T9241]  do_syscall_64+0xf6/0x7d0
[  198.322132][ T9241]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  198.328025][ T9241] RIP: 0033:0x45ca59
[  198.331916][ T9241] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  198.351519][ T9241] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  198.359939][ T9241] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  198.367916][ T9241] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
07:05:08 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r3 = dup2(r2, 0xffffffffffffffff)
write$FUSE_IOCTL(r3, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:08 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

[  198.375888][ T9241] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  198.383859][ T9241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  198.391827][ T9241] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 4 (fault-call:1 fault-nth:16):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:08 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
dup2(r2, r3)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:08 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
dup2(r2, r3)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:08 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

[  198.967933][ T9276] FAULT_INJECTION: forcing a failure.
[  198.967933][ T9276] name failslab, interval 1, probability 0, space 0, times 0
07:05:08 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

[  199.039541][ T9276] CPU: 0 PID: 9276 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  199.047832][ T9276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  199.057890][ T9276] Call Trace:
[  199.061195][ T9276]  dump_stack+0x188/0x20d
[  199.065542][ T9276]  should_fail.cold+0x5/0xa
[  199.070061][ T9276]  ? fault_create_debugfs_attr+0x140/0x140
[  199.075881][ T9276]  should_failslab+0x5/0xf
[  199.080743][ T9276]  kmem_cache_alloc_node_trace+0x27c/0x790
[  199.086562][ T9276]  ? __kmalloc+0x62f/0x7a0
[  199.090989][ T9276]  __kmalloc_node+0x38/0x60
[  199.095536][ T9276]  kvmalloc_node+0x61/0xf0
[  199.099957][ T9276]  __list_lru_init+0x50e/0x780
[  199.104737][ T9276]  alloc_super+0x86a/0x9d0
[  199.109164][ T9276]  sget_fc+0x13f/0x790
[  199.113242][ T9276]  ? compare_single+0x10/0x10
[  199.117929][ T9276]  ? proc_parse_param+0x8a0/0x8a0
[  199.122958][ T9276]  vfs_get_super+0x6d/0x2d0
[  199.127471][ T9276]  vfs_get_tree+0x89/0x2f0
[  199.131894][ T9276]  do_mount+0x1306/0x1b40
[  199.136257][ T9276]  ? copy_mount_string+0x40/0x40
[  199.141292][ T9276]  ? __might_fault+0x190/0x1d0
[  199.146065][ T9276]  ? _copy_from_user+0x13c/0x1a0
[  199.151013][ T9276]  ? memdup_user+0x7c/0xd0
[  199.155439][ T9276]  __x64_sys_mount+0x18f/0x230
[  199.160215][ T9276]  do_syscall_64+0xf6/0x7d0
[  199.164729][ T9276]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  199.170623][ T9276] RIP: 0033:0x45ca59
[  199.174518][ T9276] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  199.194122][ T9276] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  199.202540][ T9276] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  199.210522][ T9276] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  199.218501][ T9276] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  199.226475][ T9276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  199.234447][ T9276] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:09 executing program 4 (fault-call:1 fault-nth:17):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:09 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
dup2(r2, r3)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000100)={0x20, 0x800, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:09 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

07:05:09 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:09 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:09 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:09 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0)

07:05:09 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, 0x0, 0x0)

07:05:09 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

[  199.683393][ T9309] FAULT_INJECTION: forcing a failure.
[  199.683393][ T9309] name failslab, interval 1, probability 0, space 0, times 0
[  199.752692][ T9309] CPU: 1 PID: 9309 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  199.760977][ T9309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  199.771064][ T9309] Call Trace:
[  199.774369][ T9309]  dump_stack+0x188/0x20d
[  199.778724][ T9309]  should_fail.cold+0x5/0xa
[  199.783243][ T9309]  ? fault_create_debugfs_attr+0x140/0x140
[  199.789065][ T9309]  should_failslab+0x5/0xf
[  199.793485][ T9309]  kmem_cache_alloc_node_trace+0x27c/0x790
[  199.799304][ T9309]  __kmalloc_node+0x38/0x60
[  199.803815][ T9309]  kvmalloc_node+0x61/0xf0
[  199.808240][ T9309]  __list_lru_init+0x50e/0x780
[  199.813016][ T9309]  alloc_super+0x86a/0x9d0
[  199.817446][ T9309]  sget_fc+0x13f/0x790
[  199.821519][ T9309]  ? compare_single+0x10/0x10
[  199.826206][ T9309]  ? proc_parse_param+0x8a0/0x8a0
[  199.831235][ T9309]  vfs_get_super+0x6d/0x2d0
[  199.835742][ T9309]  vfs_get_tree+0x89/0x2f0
[  199.840162][ T9309]  do_mount+0x1306/0x1b40
[  199.844500][ T9309]  ? copy_mount_string+0x40/0x40
[  199.849440][ T9309]  ? __might_fault+0x190/0x1d0
[  199.854239][ T9309]  ? _copy_from_user+0x13c/0x1a0
[  199.859178][ T9309]  ? memdup_user+0x7c/0xd0
[  199.863603][ T9309]  __x64_sys_mount+0x18f/0x230
[  199.868376][ T9309]  do_syscall_64+0xf6/0x7d0
[  199.872896][ T9309]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  199.878783][ T9309] RIP: 0033:0x45ca59
[  199.882677][ T9309] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
07:05:09 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:09 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:09 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, 0x0, 0x0)

[  199.902289][ T9309] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  199.910740][ T9309] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  199.918724][ T9309] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  199.926706][ T9309] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  199.934689][ T9309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  199.942664][ T9309] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
07:05:09 executing program 4 (fault-call:1 fault-nth:18):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:09 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, 0x0, 0x0)

07:05:09 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:09 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:09 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:09 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:10 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x0, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:10 executing program 5 (fault-call:1 fault-nth:0):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:10 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:10 executing program 3 (fault-call:2 fault-nth:0):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

[  200.367045][ T9349] FAULT_INJECTION: forcing a failure.
[  200.367045][ T9349] name failslab, interval 1, probability 0, space 0, times 0
07:05:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

[  200.438379][ T9349] CPU: 0 PID: 9349 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  200.446658][ T9349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  200.456853][ T9349] Call Trace:
[  200.460161][ T9349]  dump_stack+0x188/0x20d
[  200.463093][ T9355] FAULT_INJECTION: forcing a failure.
[  200.463093][ T9355] name failslab, interval 1, probability 0, space 0, times 0
[  200.464507][ T9349]  should_fail.cold+0x5/0xa
[  200.481637][ T9349]  ? fault_create_debugfs_attr+0x140/0x140
07:05:10 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

[  200.487462][ T9349]  should_failslab+0x5/0xf
[  200.491878][ T9349]  kmem_cache_alloc_node_trace+0x27c/0x790
[  200.497698][ T9349]  ? __kmalloc+0x62f/0x7a0
[  200.502123][ T9349]  __kmalloc_node+0x38/0x60
[  200.506640][ T9349]  kvmalloc_node+0x61/0xf0
[  200.511061][ T9349]  __list_lru_init+0x50e/0x780
[  200.515823][ T9349]  alloc_super+0x894/0x9d0
[  200.520254][ T9349]  sget_fc+0x13f/0x790
[  200.524320][ T9349]  ? compare_single+0x10/0x10
[  200.528988][ T9349]  ? proc_parse_param+0x8a0/0x8a0
[  200.534006][ T9349]  vfs_get_super+0x6d/0x2d0
[  200.538522][ T9349]  vfs_get_tree+0x89/0x2f0
[  200.542943][ T9349]  do_mount+0x1306/0x1b40
[  200.547277][ T9349]  ? copy_mount_string+0x40/0x40
[  200.552214][ T9349]  ? __might_fault+0x190/0x1d0
[  200.556979][ T9349]  ? _copy_from_user+0x13c/0x1a0
[  200.561921][ T9349]  ? memdup_user+0x7c/0xd0
[  200.566338][ T9349]  __x64_sys_mount+0x18f/0x230
[  200.571115][ T9349]  do_syscall_64+0xf6/0x7d0
[  200.575624][ T9349]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  200.581517][ T9349] RIP: 0033:0x45ca59
[  200.585394][ T9349] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  200.604982][ T9349] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  200.613399][ T9349] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  200.621360][ T9349] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  200.629328][ T9349] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  200.637281][ T9349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  200.645237][ T9349] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
[  200.653326][ T9355] CPU: 1 PID: 9355 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0
[  200.661569][ T9355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  200.671621][ T9355] Call Trace:
[  200.674916][ T9355]  dump_stack+0x188/0x20d
[  200.679248][ T9355]  should_fail.cold+0x5/0xa
[  200.683757][ T9355]  ? lock_downgrade+0x840/0x840
[  200.688616][ T9355]  ? fault_create_debugfs_attr+0x140/0x140
[  200.694429][ T9355]  ? netlink_insert+0x180/0x1590
[  200.699391][ T9355]  should_failslab+0x5/0xf
[  200.703813][ T9355]  kmem_cache_alloc_node+0x25c/0x760
[  200.709113][ T9355]  __alloc_skb+0xba/0x5a0
[  200.713455][ T9355]  ? __kmalloc_reserve.isra.0+0xe0/0xe0
[  200.719012][ T9355]  ? netlink_autobind.isra.0+0x21b/0x300
[  200.724761][ T9355]  netlink_sendmsg+0x97b/0xe10
[  200.729536][ T9355]  ? aa_af_perm+0x260/0x260
[  200.734041][ T9355]  ? netlink_unicast+0x740/0x740
[  200.738988][ T9355]  ? netlink_unicast+0x740/0x740
[  200.743932][ T9355]  sock_sendmsg+0xcf/0x120
[  200.748353][ T9355]  ____sys_sendmsg+0x6e6/0x810
[  200.753127][ T9355]  ? kernel_sendmsg+0x50/0x50
[  200.757815][ T9355]  ? _parse_integer+0x180/0x180
[  200.759069][ T9363] FAULT_INJECTION: forcing a failure.
[  200.759069][ T9363] name failslab, interval 1, probability 0, space 0, times 0
[  200.762671][ T9355]  ___sys_sendmsg+0x100/0x170
[  200.762686][ T9355]  ? debug_smp_processor_id+0x2f/0x185
[  200.762705][ T9355]  ? sendmsg_copy_msghdr+0x70/0x70
[  200.790510][ T9355]  ? __fget_files+0x32f/0x500
[  200.795195][ T9355]  ? ksys_dup3+0x3c0/0x3c0
[  200.799620][ T9355]  ? debug_smp_processor_id+0x2f/0x185
[  200.805082][ T9355]  ? __fget_light+0x20e/0x270
[  200.809767][ T9355]  __sys_sendmsg+0xe5/0x1b0
[  200.814297][ T9355]  ? __sys_sendmsg_sock+0xb0/0xb0
[  200.819317][ T9355]  ? vfs_write+0x161/0x5d0
[  200.823747][ T9355]  ? do_syscall_64+0x21/0x7d0
[  200.828434][ T9355]  ? lockdep_hardirqs_on_prepare+0x3a2/0x590
[  200.834414][ T9355]  do_syscall_64+0xf6/0x7d0
[  200.838909][ T9355]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  200.844784][ T9355] RIP: 0033:0x45ca59
[  200.848670][ T9355] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  200.868274][ T9355] RSP: 002b:00007f59f2f01c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  200.876691][ T9355] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59
[  200.884672][ T9355] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003
[  200.892645][ T9355] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  200.900615][ T9355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  200.908583][ T9355] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f59f2f026d4
[  200.916572][ T9363] CPU: 0 PID: 9363 Comm: syz-executor.3 Not tainted 5.7.0-syzkaller #0
[  200.924851][ T9363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  200.934906][ T9363] Call Trace:
[  200.938208][ T9363]  dump_stack+0x188/0x20d
[  200.942554][ T9363]  should_fail.cold+0x5/0xa
[  200.947069][ T9363]  ? lock_downgrade+0x840/0x840
[  200.951930][ T9363]  ? fault_create_debugfs_attr+0x140/0x140
[  200.957740][ T9363]  ? netlink_insert+0x180/0x1590
[  200.962689][ T9363]  should_failslab+0x5/0xf
[  200.967112][ T9363]  kmem_cache_alloc_node+0x25c/0x760
[  200.972421][ T9363]  __alloc_skb+0xba/0x5a0
[  200.976758][ T9363]  ? __kmalloc_reserve.isra.0+0xe0/0xe0
[  200.982308][ T9363]  ? netlink_autobind.isra.0+0x21b/0x300
[  200.987948][ T9363]  netlink_sendmsg+0x97b/0xe10
[  200.992719][ T9363]  ? aa_af_perm+0x260/0x260
[  200.997222][ T9363]  ? netlink_unicast+0x740/0x740
[  201.002171][ T9363]  ? netlink_unicast+0x740/0x740
[  201.007109][ T9363]  sock_sendmsg+0xcf/0x120
[  201.011533][ T9363]  ____sys_sendmsg+0x6e6/0x810
[  201.016302][ T9363]  ? kernel_sendmsg+0x50/0x50
[  201.020982][ T9363]  ? _parse_integer+0x180/0x180
[  201.025848][ T9363]  ___sys_sendmsg+0x100/0x170
[  201.030524][ T9363]  ? debug_smp_processor_id+0x2f/0x185
[  201.035989][ T9363]  ? sendmsg_copy_msghdr+0x70/0x70
[  201.041113][ T9363]  ? __fget_files+0x32f/0x500
[  201.045796][ T9363]  ? ksys_dup3+0x3c0/0x3c0
[  201.050219][ T9363]  ? debug_smp_processor_id+0x2f/0x185
[  201.055690][ T9363]  ? __fget_light+0x20e/0x270
[  201.060375][ T9363]  __sys_sendmsg+0xe5/0x1b0
[  201.064882][ T9363]  ? __sys_sendmsg_sock+0xb0/0xb0
[  201.069907][ T9363]  ? vfs_write+0x161/0x5d0
[  201.074380][ T9363]  ? do_syscall_64+0x21/0x7d0
[  201.079071][ T9363]  ? lockdep_hardirqs_on_prepare+0x3a2/0x590
[  201.085060][ T9363]  do_syscall_64+0xf6/0x7d0
[  201.089573][ T9363]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  201.095474][ T9363] RIP: 0033:0x45ca59
[  201.099373][ T9363] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  201.118980][ T9363] RSP: 002b:00007f58edd5dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  201.127399][ T9363] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59
07:05:10 executing program 4 (fault-call:1 fault-nth:19):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:10 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:10 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x0, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

[  201.135378][ T9363] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003
[  201.139554][ T9375] FAULT_INJECTION: forcing a failure.
[  201.139554][ T9375] name failslab, interval 1, probability 0, space 0, times 0
[  201.143345][ T9363] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000
[  201.143354][ T9363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  201.143362][ T9363] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f58edd5e6d4
07:05:10 executing program 5 (fault-call:1 fault-nth:1):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:10 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x0, 0x7, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

07:05:10 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

[  201.209665][ T9375] CPU: 1 PID: 9375 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  201.217948][ T9375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.228007][ T9375] Call Trace:
[  201.231310][ T9375]  dump_stack+0x188/0x20d
[  201.235654][ T9375]  should_fail.cold+0x5/0xa
[  201.240173][ T9375]  ? fault_create_debugfs_attr+0x140/0x140
[  201.245991][ T9375]  should_failslab+0x5/0xf
[  201.250405][ T9375]  kmem_cache_alloc_node_trace+0x27c/0x790
[  201.256226][ T9375]  __kmalloc_node+0x38/0x60
[  201.260778][ T9375]  kvmalloc_node+0x61/0xf0
[  201.265199][ T9375]  __list_lru_init+0x50e/0x780
[  201.269973][ T9375]  alloc_super+0x894/0x9d0
[  201.274400][ T9375]  sget_fc+0x13f/0x790
[  201.278476][ T9375]  ? compare_single+0x10/0x10
[  201.283158][ T9375]  ? proc_parse_param+0x8a0/0x8a0
[  201.288189][ T9375]  vfs_get_super+0x6d/0x2d0
[  201.292824][ T9375]  vfs_get_tree+0x89/0x2f0
[  201.297261][ T9375]  do_mount+0x1306/0x1b40
[  201.301226][ T9378] FAULT_INJECTION: forcing a failure.
[  201.301226][ T9378] name failslab, interval 1, probability 0, space 0, times 0
[  201.301596][ T9375]  ? copy_mount_string+0x40/0x40
[  201.319101][ T9375]  ? __might_fault+0x190/0x1d0
[  201.323870][ T9375]  ? _copy_from_user+0x13c/0x1a0
[  201.328823][ T9375]  ? memdup_user+0x7c/0xd0
[  201.333248][ T9375]  __x64_sys_mount+0x18f/0x230
[  201.338019][ T9375]  do_syscall_64+0xf6/0x7d0
[  201.342531][ T9375]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  201.348420][ T9375] RIP: 0033:0x45ca59
[  201.352315][ T9375] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  201.371925][ T9375] RSP: 002b:00007ff9ef045c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  201.380344][ T9375] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  201.388323][ T9375] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  201.396302][ T9375] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
07:05:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

[  201.404288][ T9375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  201.412264][ T9375] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0466d4
[  201.451175][ T9378] CPU: 0 PID: 9378 Comm: syz-executor.5 Not tainted 5.7.0-syzkaller #0
[  201.459452][ T9378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.469510][ T9378] Call Trace:
[  201.472805][ T9378]  dump_stack+0x188/0x20d
[  201.477142][ T9378]  should_fail.cold+0x5/0xa
[  201.481648][ T9378]  ? lock_downgrade+0x840/0x840
[  201.486500][ T9378]  ? fault_create_debugfs_attr+0x140/0x140
[  201.492308][ T9378]  ? fs_reclaim_release+0xa/0x20
[  201.497255][ T9378]  should_failslab+0x5/0xf
[  201.501669][ T9378]  kmem_cache_alloc_node_trace+0x27c/0x790
[  201.507478][ T9378]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  201.513476][ T9378]  __kmalloc_node_track_caller+0x38/0x60
[  201.519125][ T9378]  __kmalloc_reserve.isra.0+0x39/0xe0
[  201.524506][ T9378]  __alloc_skb+0xef/0x5a0
[  201.528843][ T9378]  ? __kmalloc_reserve.isra.0+0xe0/0xe0
[  201.534394][ T9378]  ? netlink_autobind.isra.0+0x21b/0x300
[  201.540035][ T9378]  netlink_sendmsg+0x97b/0xe10
[  201.544805][ T9378]  ? aa_af_perm+0x260/0x260
07:05:11 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  201.549308][ T9378]  ? netlink_unicast+0x740/0x740
[  201.554262][ T9378]  ? netlink_unicast+0x740/0x740
[  201.559207][ T9378]  sock_sendmsg+0xcf/0x120
[  201.563636][ T9378]  ____sys_sendmsg+0x6e6/0x810
[  201.568410][ T9378]  ? kernel_sendmsg+0x50/0x50
[  201.573088][ T9378]  ? _parse_integer+0x180/0x180
[  201.577936][ T9378]  ___sys_sendmsg+0x100/0x170
[  201.582587][ T9378]  ? debug_smp_processor_id+0x2f/0x185
[  201.588040][ T9378]  ? sendmsg_copy_msghdr+0x70/0x70
[  201.593132][ T9378]  ? __fget_files+0x32f/0x500
[  201.597785][ T9378]  ? ksys_dup3+0x3c0/0x3c0
[  201.602209][ T9378]  ? debug_smp_processor_id+0x2f/0x185
[  201.607643][ T9378]  ? __fget_light+0x20e/0x270
[  201.612295][ T9378]  __sys_sendmsg+0xe5/0x1b0
[  201.616773][ T9378]  ? __sys_sendmsg_sock+0xb0/0xb0
[  201.621770][ T9378]  ? vfs_write+0x161/0x5d0
[  201.626169][ T9378]  ? do_syscall_64+0x21/0x7d0
[  201.630826][ T9378]  ? lockdep_hardirqs_on_prepare+0x3a2/0x590
[  201.636803][ T9378]  do_syscall_64+0xf6/0x7d0
[  201.641282][ T9378]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  201.647148][ T9378] RIP: 0033:0x45ca59
[  201.651017][ T9378] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  201.670606][ T9378] RSP: 002b:00007f59f2f01c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  201.678991][ T9378] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59
[  201.686937][ T9378] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003
07:05:11 executing program 3 (fault-call:2 fault-nth:1):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:11 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  201.694892][ T9378] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  201.702838][ T9378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  201.710803][ T9378] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f59f2f026d4
07:05:11 executing program 4 (fault-call:1 fault-nth:20):
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(&(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0)

07:05:11 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x4c}}, 0x0)

07:05:11 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

07:05:11 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x400001}}, 0x20)

[  201.849897][ T9394] FAULT_INJECTION: forcing a failure.
[  201.849897][ T9394] name failslab, interval 1, probability 0, space 0, times 0
[  201.863026][ T9394] CPU: 0 PID: 9394 Comm: syz-executor.3 Not tainted 5.7.0-syzkaller #0
[  201.871276][ T9394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.881332][ T9394] Call Trace:
[  201.884630][ T9394]  dump_stack+0x188/0x20d
[  201.888972][ T9394]  should_fail.cold+0x5/0xa
[  201.893488][ T9394]  ? fault_create_debugfs_attr+0x140/0x140
[  201.899305][ T9394]  ? arch_local_save_flags+0x19/0x40
[  201.904599][ T9394]  should_failslab+0x5/0xf
[  201.909025][ T9394]  kmem_cache_alloc_node_trace+0x27c/0x790
[  201.914836][ T9394]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  201.920826][ T9394]  __kmalloc_node_track_caller+0x38/0x60
[  201.926468][ T9394]  __kmalloc_reserve.isra.0+0x39/0xe0
[  201.931851][ T9394]  __alloc_skb+0xef/0x5a0
[  201.936193][ T9394]  ? __kmalloc_reserve.isra.0+0xe0/0xe0
[  201.941748][ T9394]  ? netlink_autobind.isra.0+0x21b/0x300
[  201.947387][ T9394]  netlink_sendmsg+0x97b/0xe10
[  201.952166][ T9394]  ? aa_af_perm+0x260/0x260
[  201.956677][ T9394]  ? netlink_unicast+0x740/0x740
[  201.961636][ T9394]  ? netlink_unicast+0x740/0x740
[  201.966584][ T9394]  sock_sendmsg+0xcf/0x120
[  201.971010][ T9394]  ____sys_sendmsg+0x6e6/0x810
[  201.975791][ T9394]  ? kernel_sendmsg+0x50/0x50
[  201.980507][ T9394]  ? lock_downgrade+0x840/0x840
[  201.985373][ T9394]  ___sys_sendmsg+0x100/0x170
[  201.990068][ T9394]  ? sendmsg_copy_msghdr+0x70/0x70
[  201.995189][ T9394]  ? retint_kernel+0x2b/0x2b
[  201.999781][ T9394]  ? trace_hardirqs_on_caller+0x64/0x240
[  202.005417][ T9394]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  202.010880][ T9394]  ? smp_apic_timer_interrupt+0x1b6/0x600
[  202.016602][ T9394]  ? retint_kernel+0x2b/0x2b
[  202.021204][ T9394]  ? sockfd_lookup_light+0x69/0x170
[  202.026410][ T9394]  ? sockfd_lookup_light+0x6e/0x170
[  202.031616][ T9394]  __sys_sendmsg+0xe5/0x1b0
[  202.036123][ T9394]  ? __sys_sendmsg_sock+0xb0/0xb0
[  202.041170][ T9394]  ? do_syscall_64+0x4f/0x7d0
[  202.045856][ T9394]  do_syscall_64+0xf6/0x7d0
[  202.050364][ T9394]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  202.056253][ T9394] RIP: 0033:0x45ca59
[  202.060156][ T9394] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  202.079759][ T9394] RSP: 002b:00007f58edd7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  202.088175][ T9394] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59
[  202.096148][ T9394] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004
[  202.104120][ T9394] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  202.112095][ T9394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  202.120068][ T9394] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f58edd7f6d4
[  202.152243][ T9400] FAULT_INJECTION: forcing a failure.
[  202.152243][ T9400] name failslab, interval 1, probability 0, space 0, times 0
[  202.198565][ T9400] CPU: 0 PID: 9400 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  202.206834][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  202.216890][ T9400] Call Trace:
[  202.220190][ T9400]  dump_stack+0x188/0x20d
[  202.224533][ T9400]  should_fail.cold+0x5/0xa
[  202.229047][ T9400]  ? fault_create_debugfs_attr+0x140/0x140
[  202.234855][ T9400]  ? idr_replace+0xee/0x160
[  202.239368][ T9400]  should_failslab+0x5/0xf
[  202.243787][ T9400]  kmem_cache_alloc_trace+0x2d0/0x7d0
[  202.249164][ T9400]  ? up_write+0x148/0x470
[  202.253504][ T9400]  proc_fill_super+0x79/0x5c0
[  202.258183][ T9400]  ? proc_parse_param+0x8a0/0x8a0
[  202.263216][ T9400]  vfs_get_super+0x12e/0x2d0
[  202.267811][ T9400]  vfs_get_tree+0x89/0x2f0
[  202.272236][ T9400]  do_mount+0x1306/0x1b40
[  202.276688][ T9400]  ? copy_mount_string+0x40/0x40
[  202.281629][ T9400]  ? __might_fault+0x190/0x1d0
[  202.286394][ T9400]  ? _copy_from_user+0x13c/0x1a0
[  202.291342][ T9400]  ? memdup_user+0x7c/0xd0
[  202.295770][ T9400]  __x64_sys_mount+0x18f/0x230
[  202.300540][ T9400]  do_syscall_64+0xf6/0x7d0
[  202.305056][ T9400]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  202.310944][ T9400] RIP: 0033:0x45ca59
[  202.314837][ T9400] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  202.334441][ T9400] RSP: 002b:00007ff9ef024c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  202.342858][ T9400] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  202.350832][ T9400] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  202.358805][ T9400] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000
[  202.366778][ T9400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  202.374889][ T9400] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0256d4
[  202.421602][ T9400] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN
[  202.433375][ T9400] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[  202.441874][ T9400] CPU: 0 PID: 9400 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0
[  202.450104][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  202.460178][ T9400] RIP: 0010:proc_kill_sb+0x4d/0x110
[  202.465374][ T9400] Code: c1 ea 03 80 3c 02 00 0f 85 ad 00 00 00 49 8b ac 24 68 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a1 00 00 00 4c 8b 6d 08 4d 85 ed 74 0d e8 cb 51
[  202.484973][ T9400] RSP: 0018:ffffc900080a7d48 EFLAGS: 00010202
[  202.491052][ T9400] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc9001251a000
[  202.499025][ T9400] RDX: 0000000000000001 RSI: ffffffff81e37c9d RDI: 0000000000000008
[  202.506990][ T9400] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
07:05:12 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:12 executing program 0 (fault-call:1 fault-nth:0):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

07:05:12 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0x0, 0x0, 0x0, 0x400001}}, 0x20)

07:05:12 executing program 2:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

[  202.514960][ T9400] R10: ffffffff8c347a2f R11: fffffbfff1868f45 R12: ffff88809dc9a000
[  202.522926][ T9400] R13: 00000000fffffff4 R14: 0000000000000000 R15: ffff88809dc9a068
[  202.530897][ T9400] FS:  00007ff9ef025700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
[  202.539817][ T9400] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  202.546400][ T9400] CR2: 00007ffcdb23fe7c CR3: 0000000094060000 CR4: 00000000001406f0
[  202.554370][ T9400] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  202.562339][ T9400] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  202.570304][ T9400] Call Trace:
[  202.573594][ T9400]  deactivate_locked_super+0x8c/0xf0
[  202.578875][ T9400]  vfs_get_super+0x258/0x2d0
[  202.583466][ T9400]  vfs_get_tree+0x89/0x2f0
[  202.587019][ T9415] FAULT_INJECTION: forcing a failure.
[  202.587019][ T9415] name failslab, interval 1, probability 0, space 0, times 0
[  202.600452][ T9400]  do_mount+0x1306/0x1b40
[  202.600469][ T9400]  ? copy_mount_string+0x40/0x40
[  202.600483][ T9400]  ? __might_fault+0x190/0x1d0
[  202.600496][ T9400]  ? _copy_from_user+0x13c/0x1a0
[  202.600512][ T9400]  ? memdup_user+0x7c/0xd0
[  202.600532][ T9400]  __x64_sys_mount+0x18f/0x230
[  202.627741][ T9415] CPU: 1 PID: 9415 Comm: syz-executor.0 Not tainted 5.7.0-syzkaller #0
[  202.628552][ T9400]  do_syscall_64+0xf6/0x7d0
[  202.636747][ T9415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  202.636756][ T9415] Call Trace:
[  202.641243][ T9400]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  202.651271][ T9415]  dump_stack+0x188/0x20d
[  202.654534][ T9400] RIP: 0033:0x45ca59
[  202.660412][ T9415]  should_fail.cold+0x5/0xa
[  202.664707][ T9400] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  202.668572][ T9415]  ? lock_downgrade+0x840/0x840
[  202.673038][ T9400] RSP: 002b:00007ff9ef024c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  202.692634][ T9415]  ? fault_create_debugfs_attr+0x140/0x140
[  202.697446][ T9400] RAX: ffffffffffffffda RBX: 00000000004f6ca0 RCX: 000000000045ca59
[  202.705828][ T9415]  ? netlink_insert+0x180/0x1590
[  202.711593][ T9400] RDX: 00000000200000c0 RSI: 0000000020000200 RDI: 00000000200009c0
[  202.719541][ T9415]  ? trace_hardirqs_on+0x5f/0x230
[  202.724440][ T9400] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000
[  202.732386][ T9415]  ? netlink_insert+0x180/0x1590
[  202.737371][ T9400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
[  202.745328][ T9415]  should_failslab+0x5/0xf
[  202.750230][ T9400] R13: 0000000000000768 R14: 00000000004ca5c0 R15: 00007ff9ef0256d4
[  202.758178][ T9415]  kmem_cache_alloc_node+0x25c/0x760
[  202.762554][ T9400] Modules linked in:
[  202.770522][ T9415]  __alloc_skb+0xba/0x5a0
[  202.783972][ T9415]  ? __kmalloc_reserve.isra.0+0xe0/0xe0
[  202.789523][ T9415]  ? netlink_autobind.isra.0+0x21b/0x300
[  202.795149][ T9415]  netlink_sendmsg+0x97b/0xe10
[  202.799906][ T9415]  ? aa_af_perm+0x260/0x260
[  202.804405][ T9415]  ? netlink_unicast+0x740/0x740
[  202.809342][ T9415]  ? netlink_unicast+0x740/0x740
[  202.814275][ T9415]  sock_sendmsg+0xcf/0x120
[  202.818691][ T9415]  ____sys_sendmsg+0x6e6/0x810
[  202.823452][ T9415]  ? kernel_sendmsg+0x50/0x50
[  202.828128][ T9415]  ? _parse_integer+0x180/0x180
[  202.832976][ T9415]  ? lock_acquire+0x1f2/0x8f0
[  202.837674][ T9415]  ___sys_sendmsg+0x100/0x170
[  202.842233][ T9400] ---[ end trace 0b1f0a2b8427ddfe ]---
[  202.842343][ T9415]  ? sendmsg_copy_msghdr+0x70/0x70
[  202.850170][ T9400] RIP: 0010:proc_kill_sb+0x4d/0x110
[  202.852864][ T9415]  ? __fget_files+0x32f/0x500
[  202.858088][ T9400] Code: c1 ea 03 80 3c 02 00 0f 85 ad 00 00 00 49 8b ac 24 68 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7d 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a1 00 00 00 4c 8b 6d 08 4d 85 ed 74 0d e8 cb 51
[  202.862675][ T9415]  ? ksys_dup3+0x3c0/0x3c0
[  202.886643][ T9415]  ? fsnotify+0x7df/0xb50
[  202.890971][ T9415]  ? __fget_light+0x20e/0x270
[  202.895658][ T9415]  __sys_sendmsg+0xe5/0x1b0
[  202.900162][ T9415]  ? __sys_sendmsg_sock+0xb0/0xb0
[  202.905179][ T9415]  ? vfs_write+0x161/0x5d0
[  202.905698][ T9400] RSP: 0018:ffffc900080a7d48 EFLAGS: 00010202
[  202.909588][ T9415]  ? entry_SYSCALL_64_after_hwframe+0x4e/0xb3
[  202.921674][ T9415]  ? trace_hardirqs_off_caller+0x55/0x230
[  202.927394][ T9415]  do_syscall_64+0xf6/0x7d0
[  202.931002][ T9400] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc9001251a000
[  202.931891][ T9415]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  202.945705][ T9415] RIP: 0033:0x45ca59
[  202.949593][ T9415] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  202.969190][ T9415] RSP: 002b:00007fc20ca99c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  202.973855][ T9400] RDX: 0000000000000001 RSI: ffffffff81e37c9d RDI: 0000000000000008
[  202.977676][ T9415] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59
[  202.977683][ T9415] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003
[  202.977689][ T9415] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  202.977695][ T9415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
07:05:12 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c)
r4 = dup2(r2, r3)
write$FUSE_IOCTL(r4, &(0x7f0000000100)={0x20, 0x800, 0x7, {0x0, 0x0, 0x0, 0x400001}}, 0x20)

07:05:12 executing program 3 (fault-call:2 fault-nth:2):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)
socket(0x0, 0x0, 0x0)

07:05:12 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x54, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x54}}, 0x0)

[  202.977702][ T9415] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007fc20ca9a6d4
07:05:12 executing program 2:
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0)

[  203.119889][ T9428] FAULT_INJECTION: forcing a failure.
[  203.119889][ T9428] name failslab, interval 1, probability 0, space 0, times 0
[  203.146919][ T9400] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
[  203.150132][ T9428] CPU: 1 PID: 9428 Comm: syz-executor.3 Tainted: G      D           5.7.0-syzkaller #0
[  203.164537][ T9428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  203.174569][ T9428] Call Trace:
[  203.177842][ T9428]  dump_stack+0x188/0x20d
[  203.182152][ T9428]  should_fail.cold+0x5/0xa
[  203.186632][ T9428]  ? fault_create_debugfs_attr+0x140/0x140
[  203.192412][ T9428]  ? lock_acquire+0x1f2/0x8f0
[  203.197064][ T9428]  ? netlink_deliver_tap+0x146/0xb50
[  203.202324][ T9428]  should_failslab+0x5/0xf
[  203.206715][ T9428]  kmem_cache_alloc+0x44/0x740
[  203.211456][ T9428]  ? lock_downgrade+0x840/0x840
[  203.216285][ T9428]  skb_clone+0x14d/0x3c0
[  203.220502][ T9428]  netlink_deliver_tap+0x91c/0xb50
[  203.225593][ T9428]  netlink_unicast+0x5e9/0x740
[  203.230332][ T9428]  ? netlink_attachskb+0x810/0x810
[  203.235418][ T9428]  ? _copy_from_iter_full+0x25c/0x870
[  203.240763][ T9428]  ? __phys_addr_symbol+0x2c/0x70
[  203.245765][ T9428]  ? __check_object_size+0x171/0x437
[  203.251028][ T9428]  netlink_sendmsg+0x882/0xe10
[  203.255772][ T9428]  ? aa_af_perm+0x260/0x260
[  203.260269][ T9428]  ? netlink_unicast+0x740/0x740
[  203.265185][ T9428]  ? netlink_unicast+0x740/0x740
[  203.270099][ T9428]  sock_sendmsg+0xcf/0x120
[  203.274492][ T9428]  ____sys_sendmsg+0x6e6/0x810
[  203.279232][ T9428]  ? kernel_sendmsg+0x50/0x50
[  203.283896][ T9428]  ? _parse_integer+0x180/0x180
[  203.288741][ T9428]  ? lock_acquire+0x1f2/0x8f0
[  203.293421][ T9428]  ___sys_sendmsg+0x100/0x170
[  203.298103][ T9428]  ? sendmsg_copy_msghdr+0x70/0x70
[  203.303197][ T9428]  ? __fget_files+0x32f/0x500
[  203.307939][ T9428]  ? ksys_dup3+0x3c0/0x3c0
[  203.312345][ T9428]  ? fsnotify+0x7df/0xb50
[  203.316654][ T9428]  ? __fget_light+0x20e/0x270
[  203.321310][ T9428]  __sys_sendmsg+0xe5/0x1b0
[  203.325792][ T9428]  ? __sys_sendmsg_sock+0xb0/0xb0
[  203.330804][ T9428]  ? vfs_write+0x161/0x5d0
[  203.335198][ T9428]  ? ret_from_intr+0x2b/0x2b
[  203.339762][ T9428]  ? trace_hardirqs_off_caller+0x55/0x230
[  203.345474][ T9428]  do_syscall_64+0xf6/0x7d0
[  203.349966][ T9428]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[  203.355831][ T9428] RIP: 0033:0x45ca59
[  203.359702][ T9428] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  203.379287][ T9428] RSP: 002b:00007f58edd7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  203.387670][ T9428] RAX: ffffffffffffffda RBX: 00000000004fe3e0 RCX: 000000000045ca59
[  203.395625][ T9428] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004
[  203.403570][ T9428] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  203.411527][ T9428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  203.419485][ T9428] R13: 0000000000000945 R14: 00000000004cc0c7 R15: 00007f58edd7f6d4
[  203.446561][ T9400] R10: ffffffff8c347a2f R11: fffffbfff1868f45 R12: ffff88809dc9a000
[  203.475122][ T9400] R13: 00000000fffffff4 R14: 0000000000000000 R15: ffff88809dc9a068
[  203.486370][ T9400] FS:  00007ff9ef025700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
[  203.497992][ T9400] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  203.504633][ T9400] CR2: 0000001b2ea22000 CR3: 0000000094060000 CR4: 00000000001406f0
[  203.512804][ T9400] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  203.524597][ T9400] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  203.532805][ T9400] Kernel panic - not syncing: Fatal exception
[  203.540046][ T9400] Kernel Offset: disabled
[  203.544362][ T9400] Rebooting in 86400 seconds..