0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080))
ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x3)
r1 = socket$inet6(0xa, 0x2, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
accept$alg(0xffffffffffffffff, 0x0, 0x0)
fremovexattr(0xffffffffffffffff, 0x0)
connect$inet6(r1, 0x0, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xfffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x32}, 0x0, @in, 0xfffffffe, 0x4, 0x0, 0x2, 0xfffffffd, 0x7ff, 0x2}}, 0xe8)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c)
sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0)

19:57:39 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0))
ioctl$RTC_PIE_ON(r2, 0x7005)
r4 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x58, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x30, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x20, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x9}]]}}}]}, 0x58}}, 0x0)

[  457.574504][T10961] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  457.637422][T10961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
19:57:39 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256-generic\x00'}, 0x58)
r2 = accept4(r1, 0x0, 0x0, 0x0)
r3 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0)
clone(0x902500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc)
newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000)
newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', &(0x7f00000002c0), 0x800)
r4 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r4, 0x4, 0xffffffffffffffff, 0x8)
lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340))
statx(0xffffffffffffffff, &(0x7f0000000200)='./file0/file0\x00', 0x800, 0x4, &(0x7f00000003c0))
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r7 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r7, 0x4, 0xffffffffffffffff, 0x8)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r9=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r9, 0x0)
statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x200, &(0x7f0000000500))
r10 = socket(0x10, 0x6, 0x0)
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r11=>0xffffffffffffffff})
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x8000, 0x0)

[  457.658934][T10961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  457.681523][T10969] netlink: 'syz-executor.3': attribute type 3 has an invalid length.
19:57:39 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x41, 0xb, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
readlink(&(0x7f0000000340)='./bus/file0\x00', &(0x7f00000003c0)=""/221, 0xdd)
getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000300), &(0x7f0000000500)=0x4)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f5083002005a7bb39503ed2272e8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1f601000080445d8f244f6be479ffffffffff8756ea7d4865881a000000b90f1d7106f5776f7894ee47382b8811e658a49a0eba9b9d"], 0x81)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00')
preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000208, 0x0)
socket(0x0, 0x2, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
geteuid()
r2 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x3, 0x1)
getsockopt$inet_mreqn(r2, 0x0, 0x33, &(0x7f00000001c0)={@loopback, @initdev}, 0x0)
r3 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x20000, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(r3, 0x0, 0x0)

19:57:39 executing program 1:
openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getpid()
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(0x0, 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000007c0))
socket$inet6_tcp(0xa, 0x1, 0x0)
fstat(r0, &(0x7f0000000380))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0)
getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8)
ioprio_set$uid(0x3, 0x0, 0x0)
close(0xffffffffffffffff)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
ioprio_set$uid(0x3, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0)
close(r2)
syz_open_pts(r0, 0x200000)
watch_devices(r2, 0xb7, 0x0)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
close(0xffffffffffffffff)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0)
r6 = dup3(r3, r4, 0x0)
dup2(r6, r5)

[  457.827036][T10977] ERROR: Domain '<kernel> /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/6' not defined.
[  457.926578][T10984] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  457.935874][T10984] FAT-fs (loop4): Filesystem has been set read-only
[  457.943008][T10984] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17)
[  458.055179][T10997] netlink: 'syz-executor.3': attribute type 3 has an invalid length.
19:57:48 executing program 5:
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x10800, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, @rc={0x1f, {0x1, 0x0, 0x2, 0x63, 0x5, 0x80}, 0x6}, @rc={0x1f, {0x2, 0x8, 0x3, 0xff, 0x7, 0x5b}, 0x81}, @llc={0x1a, 0x312, 0x1f, 0x0, 0x9, 0x60, @broadcast}, 0x6, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)='veth1_to_team\x00', 0x7f, 0xffffffffffffffc1, 0x7fff})
ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0)

19:57:48 executing program 3:
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@initdev}}, &(0x7f0000000cc0)=0xe8)
bind$packet(r0, &(0x7f0000000d00)={0x11, 0x9, r1, 0x1, 0x3f, 0x6, @local}, 0x14)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000085000000410000009500"/32], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0x4d6e)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="9f99f22b78cce352415be3b364e1", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40)

19:57:48 executing program 4:
unshare(0x20000)
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00')
sendfile(r0, 0xffffffffffffffff, 0x0, 0x1)
r1 = inotify_init()
inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x20000800)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x21a, 0x0, 0x59, 0x0, 0x1d7}}], 0x1, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00')
preadv(r2, &(0x7f00000017c0), 0x315, 0x0)
mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5af933d412ebae69d783e3626bf4a4de8dbe745a55f74477e30e524133d476e6cf9497214e22f9f5f252ccd92ce88fe2965be731c7620893eeceaf430c0043f95ce1559f4885ce06e49ba9ddf1b7ef3c816d4b5d82ce5ee047bdcf0b9fc708ac1d73fbcaf03189d61b5ef14a51dbd44361a25ebaf0e30b7b73a469e16014fda7fd3e49438c1db3a9ffa1222759239d8d7e1d8fa08191ddae1b867d7222a66badd923f0bbf983359c1598c3bb9f887e8b6bcaf2092a148686ea6df81e2d8e01fe610c02d6331fb01945e3f4fa90f05a98d1ffcb64fe612608c127a7fe6e96b63de23f4189661acb4b54ed84994d913267a44190354a0a"], &(0x7f0000000240)='./file0\x00', 0x0, 0x1080, 0x0)
unlink(&(0x7f0000000080)='./file0\x00')
bind$packet(r0, &(0x7f0000000200)={0x11, 0x10, 0x0, 0x1, 0x7, 0x6, @remote}, 0x14)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), 0x0)
lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(r3, 0x0, r3)
bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280))

19:57:48 executing program 0:
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000b44000/0x2000)=nil})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008)
mlock2(&(0x7f0000a4f000/0x4000)=nil, 0x4000, 0x0)
pipe(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080))
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x401, &(0x7f0000000080)={<r5=>0xffffffffffffffff}, 0x15, 0x4}}, 0x20)
write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r5, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x4, @rand_addr="561531068b59657e37e93584da810fda", 0xfff}}}, 0xa0)
r6 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
sendfile(r3, r6, 0x0, 0x320c)

19:57:48 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00')
sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, r3, 0x3, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0)
sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="0101000000029f4db4a4222ac800"], 0x14}}, 0x0)
sendmsg$FOU_CMD_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r3, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000)
syz_open_pts(r1, 0x200102)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x80000000)

19:57:48 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a)
mount(0x0, 0x0, 0x0, 0x0, 0x0)
r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x49, 0x16000)
ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000100)=0x101)

[  466.636493][T11017] netlink: 'syz-executor.2': attribute type 4 has an invalid length.
19:57:48 executing program 3:
perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000)=0xffe1, &(0x7f0000000040)=0x2)
write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0)

19:57:48 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40, 0x0)
ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000100))
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x0, @loopback}], 0x1c)
sendmmsg$inet6(r0, &(0x7f00000067c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, &(0x7f0000002200)=[{&(0x7f0000000080)='G', 0xff3c}], 0x1}}], 0x1, 0x0)

19:57:48 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
close(r0)
read(r0, &(0x7f0000000240)=""/4096, 0x1000)
r1 = socket$inet6_sctp(0xa, 0x801, 0x84)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000040)={0x5, 0x4, 0x6, 0x2, '\x00', 0x6})
ftruncate(r2, 0x200004)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080))
connect$inet6(r3, &(0x7f0000001240)={0xa, 0x4e22, 0x101, @mcast1, 0x9}, 0x1c)
ioctl$VIDIOC_S_FBUF(r4, 0x4030560b, &(0x7f0000000000)={0x10, 0x16, &(0x7f0000000140)="784e75fdeae31d3c0ef9c3bba1a6ebf8a97ffcf291fdf9b5de6e3d5f69132d93f44a5c97aaa6149a702444e7939e7fbd83025df7976a08adfbc35ee3dace925687c3b3539d627fdf38efb1105a9dfb8be8ba3d4de5870c201eeb999beb6939aa156ba6ccf662a1e55cb3b81414685fee95169be50bdb4142e7c6e3a00a6524fba35348b4843bfb541fa49d64328b04bd8520cb1b84a6f64cba139fb6add63a8741934c2d42849f8eb6ed343f19bb7805f4599886562a37a48ed34f8c640c62895a08edfc0ef8de3ad60c54e5a885acd4e3ce9e1e03994cb06c5e12dbb8689b334247", {0xbd, 0xff, 0xd2777070, 0x4, 0x3, 0x80000000, 0x1, 0x7ff}})
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8)
sendfile(r0, r2, 0x0, 0x80001d000010)

19:57:48 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x10000000, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
tkill(0x0, 0x0)
r1 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10)
connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c)
r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
sendfile(r0, r2, 0x0, 0xedc0)
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0)
socket(0x0, 0x0, 0x0)

19:57:49 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={<r0=>0x0, <r1=>0x0})
close(r0)
r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x2, 0x1, 0x401, 0x2, 0x814f}})
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x47}, 0x3c)
setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r3=>0x0, <r4=>0x0})
close(r3)
setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127)
sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x9c020000}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1}, 0x0)
gettid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000))
ptrace$getregs(0xe, 0x0, 0xff, &(0x7f0000000380)=""/144)

19:57:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r3)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x368, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="1953998c9a3223620e22f237d5372597f19d3abf1a9d24c3a0088322eedd77a7c61a4400eceefa7e6afd58d47bf2495c952cbe7fcdab06c736b3838291582bb9079022b68050010016171fefbaabc5c5656609bba2054385bfe6c116caec47f441e31edc7cac126e9fc2b7e2216d555aefe47d770e9830239b8396f491f86d6277cae72b3551e9ea640e5944e686a112241a981226ae0037d47ac9f0101f3201728b73076d1a6b8feb6c1b8a4f357815ef66152a3e26ed0024732b7f2943e36f59548e111509e83fb04e0319831946ef047adaeacc775b9bf9335f4e55", @ANYRESOCT=r4], @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r3], 0x4}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  467.378605][   T27] audit: type=1800 audit(1577390269.478:57): pid=11045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16593 res=0
[  467.408615][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  467.414614][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:57:57 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x3, 0xff)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c)
sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8)

19:57:57 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0)
r3 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r5=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r5)
write$binfmt_elf64(r3, &(0x7f00000004c0)=ANY=[], 0x0)
execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r6 = dup(r3)
write$P9_RGETATTR(r6, &(0x7f0000000400)={0x186, 0x19, 0x0, {0x0, {0x8a, 0x0, 0xffffffffffffffff}, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xa0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00')

19:57:57 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = dup2(r5, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
prctl$PR_SVE_GET_VL(0x33, 0x9)

19:57:57 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r3)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x368, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="1953998c9a3223620e22f237d5372597f19d3abf1a9d24c3a0088322eedd77a7c61a4400eceefa7e6afd58d47bf2495c952cbe7fcdab06c736b3838291582bb9079022b68050010016171fefbaabc5c5656609bba2054385bfe6c116caec47f441e31edc7cac126e9fc2b7e2216d555aefe47d770e9830239b8396f491f86d6277cae72b3551e9ea640e5944e686a112241a981226ae0037d47ac9f0101f3201728b73076d1a6b8feb6c1b8a4f357815ef66152a3e26ed0024732b7f2943e36f59548e111509e83fb04e0319831946ef047adaeacc775b9bf9335f4e55", @ANYRESOCT=r4], @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r3], 0x4}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:57:57 executing program 1:
ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)})
r0 = socket$packet(0x11, 0x3, 0x300)
mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x300000b, 0x4000010, r0, 0x0)
r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0)
gettid()
r2 = creat(&(0x7f0000000280)='./file0\x00', 0x90)
write$binfmt_script(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="737e7b0debe9070ad9309fc751b6881820edbae8c6aedbf363e1c92077aa8926727d57e8a03df6ac83a869dda6113d85cf0f37839b67e9ee5cac0d85db8b528f2be6d3ec04c6f37c29f1acd9140f649400a64ad50ddfcdfe936755a9045f55c92445abb6ef"], 0xb)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x3, 0x7)
r4 = socket$inet6(0xa, 0x3, 0x7)
connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x10000}, {0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @local}, 0x0, 0x1, 0x0, 0x6, 0x0, 0x2}}, 0xe8)
sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xfec0)
r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0)
r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, <r7=>0xffffffffffffffff})
r8 = dup(r7)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)={<r9=>0x0, 0x0, r8})
ioctl$DRM_IOCTL_GEM_CLOSE(r5, 0x40086409, &(0x7f0000000100)={r9, 0x7000000})
writev(r1, &(0x7f0000001540)=[{&(0x7f0000000140)="876d", 0x2}, {&(0x7f0000000240)="b3384887f2346a94c0fe2de2e80dc403dabeab95233bafc7b5a221c7d94875aa", 0x20}, {&(0x7f00000002c0)="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", 0xff}, {&(0x7f0000000400)="758abf17a4847e3a61c4e72b26b7f0a56fe36db40f5a33448dfadb3d00af17b820d614f809359ae1725a82dc71186b26c1058950cc62973bd7d68ad1913cf316c5e50a8f9e08348f", 0x48}, {&(0x7f0000000540)="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", 0xffc}], 0x5)

19:57:57 executing program 0:
r0 = socket$kcm(0xa, 0x802, 0x88)
sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x3c4, 0x0}, 0x8000)
sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000180)=@nl=@unspec={0xa, 0x2a77, 0xfc90000}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000001280)}, 0x0)

19:57:58 executing program 1:

19:57:58 executing program 0:

19:57:58 executing program 2:

19:57:58 executing program 4:

19:57:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:57:58 executing program 0:
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=ANY=[], 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')
arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
dup2(r0, r0)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000380), &(0x7f00000005c0)=0xffffffffffffffa9)
lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f00000000c0)=ANY=[], 0x0, 0x1)
socket$packet(0x11, 0x0, 0x300)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xfffffffffffffffd)
r2 = socket$packet(0x11, 0x0, 0x300)
getsockname$packet(r2, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
mkdir(&(0x7f0000000000)='./file0\x00', 0x1)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000001c0))

[  476.288677][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  476.294513][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  476.528621][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  476.534424][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  477.408643][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  477.414457][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  477.818640][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  477.824520][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  477.968693][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  477.974525][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  481.568675][    C0] net_ratelimit: 14 callbacks suppressed
[  481.574404][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  481.580315][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  481.968721][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  481.974754][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  482.128719][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  482.128828][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  482.538678][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  482.544486][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  482.768646][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  482.768701][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:07 executing program 2:

19:58:07 executing program 5:

19:58:07 executing program 4:

19:58:07 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r3)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x368, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="1953998c9a3223620e22f237d5372597f19d3abf1a9d24c3a0088322eedd77a7c61a4400eceefa7e6afd58d47bf2495c952cbe7fcdab06c736b3838291582bb9079022b68050010016171fefbaabc5c5656609bba2054385bfe6c116caec47f441e31edc7cac126e9fc2b7e2216d555aefe47d770e9830239b8396f491f86d6277cae72b3551e9ea640e5944e686a112241a981226ae0037d47ac9f0101f3201728b73076d1a6b8feb6c1b8a4f357815ef66152a3e26ed0024732b7f2943e36f59548e111509e83fb04e0319831946ef047adaeacc775b9bf9335f4e55", @ANYRESOCT=r4], @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r3], 0x4}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:07 executing program 0:

19:58:07 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:07 executing program 0:

19:58:07 executing program 2:

19:58:07 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [@call={0x6e}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64)

19:58:07 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r3)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x368, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="1953998c9a3223620e22f237d5372597f19d3abf1a9d24c3a0088322eedd77a7c61a4400eceefa7e6afd58d47bf2495c952cbe7fcdab06c736b3838291582bb9079022b68050010016171fefbaabc5c5656609bba2054385bfe6c116caec47f441e31edc7cac126e9fc2b7e2216d555aefe47d770e9830239b8396f491f86d6277cae72b3551e9ea640e5944e686a112241a981226ae0037d47ac9f0101f3201728b73076d1a6b8feb6c1b8a4f357815ef66152a3e26ed0024732b7f2943e36f59548e111509e83fb04e0319831946ef047adaeacc775b9bf9335f4e55", @ANYRESOCT=r4], @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r3], 0x4}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:07 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009})
ioctl$TUNSETTXFILTER(r0, 0x400454d0, 0x0)

19:58:07 executing program 0:
recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=""/251, 0xfb}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00')
preadv(r1, &(0x7f00000017c0), 0x1d0, 0x2)

19:58:07 executing program 4:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
select(0xf4, 0x0, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x2a)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x10000, 0x9})
sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e1000000300000000db73040500060000606b1fbbcae06b644e23aea0840000f609000000000000040055d0dbb525e8b2d400f721"], 0x39}}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

19:58:07 executing program 0:
r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0)
ioctl$sock_proto_private(r0, 0x89e3, &(0x7f0000000400)="0f")

[  486.688686][    C0] net_ratelimit: 16 callbacks suppressed
[  486.688692][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  486.700297][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  486.928660][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  486.934510][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  487.808658][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  487.814508][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  488.208633][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  488.214476][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  488.378675][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  488.384515][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:13 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2b, 0x1, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0x800}, 0x10)
r2 = socket(0x1e, 0x805, 0x0)
setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c)
sendmsg(r2, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0)
ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e24, @multicast2}, {0x306}, 0x62, {0x2, 0x4e24, @multicast1}, 'lapb0\x00'})
r3 = accept(r2, &(0x7f0000000240)=@nfc, &(0x7f0000000180)=0xfffffffffffffdcf)
getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, &(0x7f0000000300))
sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x1)
r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r5 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r7 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r6, r7, 0x0, 0x1)
getsockopt$TIPC_NODE_RECVQ_DEPTH(r6, 0x10f, 0x83, &(0x7f0000000380), &(0x7f00000004c0)=0x4)
sendfile(r4, r5, 0x0, 0x1)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000340)={'bond0\x00', 0x800})
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x1, 0x0, 0x2, 0x4}, 0x1c)
sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00004f5000)=@rc={0x1f, {0x9e, 0x3f, 0x80, 0x0, 0x9, 0x40}, 0xe3}, 0x80, 0x0}, 0x0)
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e24, @multicast2}, {0x306}, 0x62, {0x2, 0x4e24, @multicast1}, 'lapb0\x00'})
getsockname$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50)
prctl$PR_GET_NAME(0x10, &(0x7f0000000400)=""/192)

19:58:13 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r2)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:13 executing program 0:
openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp1\x00', 0x40, 0x0)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600)
openat$vhci(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vhci\x00', 0x400)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
syz_open_dev$vcsn(&(0x7f0000000700)='/dev/vcs#\x00', 0xd31e, 0x80)
fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0)
ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000140)={0x9, 0x6})
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
syz_mount_image$cifs(&(0x7f0000000880)='cifs\x00', &(0x7f0000000240)='./file0\x00', 0xee7, 0x4, &(0x7f0000000600)=[{&(0x7f0000000280)="4c57deb7c781d293e21b842f2fe07c2beff5f2616f2751ab64dc9a4f6e901531f68afdb3da6d9395d4e1c7b2cf12219cec35c2a6b97b04907273a68ae80b38720737403f15208ea225a07ca8516fa344165ae374e9a3e6c407a9fc49ebfdc93791bc3aa2dc9e9d8661cafda196c35122bc650015a5eadbd60ee425858bcba599ca2e43b43ef43506b740fdd60ba10f78bec70fdfe2336f1c01382058a3bf019dfdacceb175d833c3a5e61ba6a2c6278ca95d40b5eb2b0501adf662f5efe24b2931109546a465a5aed9d697cc6b6927b7bbfe938df8b7d5294358403b", 0xdc, 0x8001}, {&(0x7f0000000780)="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", 0xe7712b024e0f6157, 0x100}, {&(0x7f0000000480)="19a3c7029f64cb795d7365d8f5455fa425e5d3046c6b004b649030943aa264acfe162bef6b507d8fc1a73eb7135ee8e21afbb0f41109d6e1207639ff006bf291ecc2", 0x42, 0x3}, {&(0x7f0000000500)="6abb46673731da2f816aaf4680d5bc1cbe60d70c6eae5967d56d2b574e58795fdf82c37b71e935313193eae34b8729640c15b6e485d3a48c943fd95963d14f749727703abcd766732ac2c6bba6aaddb0242f7fe63d8879c2ae663feaf7101eb75c175bb9edb4888f0cd70184fc9b51644ae1c9dd0e0b539a48ce86e13edcd9cdc8f4e742c1dce5e0f32d7b2d093df43f746983922254a9aed0a3f43e9051a153c82d22454566e6762fd15f88000e4170ec3dd92b9c33c0af0d7dd722dde55898bdb29fb9299bbd63c99f9d11992ad24b989c9a2b7a4bc7acfa9016c8400150bb3595e898c7a1eef877189c6112d6650ce466ed3580ae86", 0xf7, 0x6}], 0x8, &(0x7f0000000680)='trusted.overlay.redirect\x00')
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000740)={0x8000, 0x2, 0x2, r3})
ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xa927, 0x38, 0x2, <r4=>0xffffffffffffffff})
r5 = dup(r4)
ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000080)=0x2)
openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0)

19:58:13 executing program 4:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x18, 0x249e1e, 0x8000000001}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000200), &(0x7f0000000100)}, 0x20)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20)
r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x505602, 0x0)
r3 = socket$inet6_sctp(0xa, 0x1, 0x84)
ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000100)={0x0, 0x6})
r4 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r5=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000280)={r5}, &(0x7f00000002c0)=0x8)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000080)={r5, 0x2d4}, 0x8)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000000c0)={0x7cfe812}, 0x4)

19:58:13 executing program 2:
perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_sctp(0x2, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x0, @loopback}], 0x10)
sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$KVM_RUN(r1, 0xae80, 0x0)

19:58:13 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:13 executing program 4:
r0 = socket$inet6(0xa, 0x80002, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000440)={@dev, 0x800, 0x2, 0xff, 0x100000000000004, 0xfffc}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@rand_addr="15376d743273146fa88268ce719f0597", 0x0, 0x0, 0xff, 0x1}, 0x20)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x1000000000800, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x20)

19:58:13 executing program 4:
r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0)
ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0xc0045005, &(0x7f0000000000)=0x1b8)

19:58:13 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r2)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0))
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  491.968604][    C0] net_ratelimit: 14 callbacks suppressed
[  491.968613][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  491.980376][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:14 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x1, 0x0)
close(r0)
r1 = socket$inet6(0xa, 0x100000000802, 0x0)
setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000340)="ff020400"/24, 0x18)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="35d4a7cf18000000629841c900"}, 0x1c)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000380)=0xc, 0x4)
r3 = socket$inet(0x2, 0x3, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r4=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r4}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000003c0)={<r5=>r4, 0x5}, &(0x7f0000000400)=0x8)
r6 = socket$inet6_sctp(0xa, 0x1, 0x84)
r7 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r8=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x8)
r9 = socket$inet6_sctp(0xa, 0x1, 0x84)
r10 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r11=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r9, 0x84, 0x76, &(0x7f0000000280)={r11}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000840)={<r12=>r11, 0xffff}, &(0x7f0000000880)=0x8)
r13 = io_uring_setup(0x925, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x1, 0x2f})
preadv(r13, &(0x7f0000000a40)=[{&(0x7f0000001080)=""/78, 0x4e}], 0x1, 0xffffffff)
r14 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/nvme-fabrics\x00', 0x200400, 0x0)
ioctl$TUNSETNOCSUM(r14, 0x400454c8, 0x1)
sendmmsg$inet_sctp(r0, &(0x7f0000000ec0)=[{&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xffffffff, @mcast2}, 0xfecd, &(0x7f0000001040)=[{&(0x7f00000000c0)="9968ec18d01fbf53c0b29f6b50e4d95f6b4dabb6fc1c09af5804ee05678a4a5bcdd9f93acf2fb816663f36858ce7d5686a338869ab4f7610783953d0a6f7106f24758d172d65d2edbf0889e455b8c0b81e489643208e8f2849719ec3722924087a13714873ecffb797bcacb1ef4336caeee5937b136b506d0f3da051860c5f3365440164147f", 0x86}, {&(0x7f0000000180)="974e89d5c86c184980e23dcee635b10f07fb0345f26305ae001ec524f8537a4119f50c0df39e38c650fda423abadb2df2741f27179b521cc24448f4f9a7cea8be5620c35887430409dbdacff3a4df9f345f1f6e9e4ca704fd59623b364da492df6f27afe0d3b927a44346354f8fbc584f0519ed6ed5617d6e5b0791a511984b43231719002fdcb0140e168e83c47569b5c019a10ca0787357c66a1b438f30c217c5bd5f18e9b8e536119478fb3dbb3135c13b9cc9db502511bdd31f97e30c23d021a1144020d71a6e0862949", 0xcc}, {&(0x7f0000000280)="d8f493db6e24b693b373e518e1221be128fe91961333c9dc4e5e48a958bd48e735b441137ff908557987836913b522edda07a66d21d1918672105adbb26de866c3268acd679855b50e1841a1455de01d1b2349f9ccf8", 0x56}, {&(0x7f0000000300)}], 0x4, &(0x7f0000000440)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @authinfo={0x18, 0x84, 0x6, {0x937}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x20}}, @sndrcv={0x30, 0x84, 0x1, {0xfff9, 0x8, 0x0, 0x20, 0x200, 0x1, 0x8001, 0x12, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x1000, 0x2, 0x200, 0x1009, 0x7fffffff, 0x5, 0xffffff81, 0x4, r8}}, @authinfo={0x18, 0x84, 0x6, {0x1b}}], 0xf0, 0x4000000}, {&(0x7f0000000540)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000580)="c5df2d", 0x3}, {&(0x7f00000005c0)="a7e89a761f3dc7d7ab0a276c76845739210dc79b04b0df40619082fee194a5363264468abc26c7b9b5f930ce309951a6948c87057fcc870708478646a35de6c78b65b9597109c294e761a74caaacc6dc8bef9d1069bd89f756c8f786fd8aa3b481ff1d8570f8d8093b5011f4a74b6a03c7a7648da7a9b9989a28559616e3ed3b4b7690e86cb1a70fdd9c7b18e6bca905f1c7c9c94a852478e2c02b4ca3412aa53c727abf398a9ffee73f3988d49293ae64add61b1d257a30d493ce", 0xbb}, {&(0x7f0000000680)="b7df2bf9087c8d1f6825013efd3122867949f87890fb4f424141aa703dfdf17ad8958596f396efe70bbb852e3f7c8c33d1de2a7df73f550ccaa0f54f540a576d2800d52c989e29c085cdb532053fa1e04eef060d6bc9a5203f401338902085eb85db23b4cd205c88c84b7e3dcabc4957747f546741a078fb59fbb0ac4c44e1eb2c2e20ab307147fd8a0f642f528333eee2bc7f9e83cfdc6b920bd1b6ff1cd2143d25c2f9041aa8881844de03eec1cd8855c87774d6e2e4", 0xb7}, {&(0x7f0000000740)="439c2d9f11273b5045279e05c40210c3d27ea91fc7dbbe9c7e4db4fdf0a697a772c3246b61a94d2b342991f8e940e138c1bb934a241d6e769d0a9028de300e61a2511d19c03773b1c9427b9e72d5b6114c64c44d78dca4cadafac416e366a7b505deef0ad0bf08bc0c8ee36539a05ff4db0c73507ca7acf82d6831e39b45cd990190b33cd25c55412835319c4c39e302e78a5f2ebae503b7aa106efc05", 0x9d}], 0x4, &(0x7f00000008c0)=[@authinfo={0x18, 0x84, 0x6, {0xf800}}, @sndinfo={0x20, 0x84, 0x2, {0x44, 0x200, 0xfffffff9, 0x0, r12}}], 0x38}, {&(0x7f0000000900)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000940)="15a30ca3423d15f92375a1294d5e33899509ca88c879d56102", 0x19}, {&(0x7f0000000fc0)="be882cbdff9208ac52e896736ac1dfb44093526cbb42860c4ff25e3962cdcfdccc2c1ed14b09190a59c44c7dada24a0237a72507b23b7f08190fce182785d91ad13afab573373800b84191d5c8d2ef76ba8f0021b6394ab2b346c5652b3b3a5908cf23472c6e5139a1fbdb306617f0406be330c78b7585efd2cda89d88f1", 0x7e}, {&(0x7f0000000a00)="ea5d1942b406591791a74ce86ba8286b6e3b44b4d83a1987cf660bb9eeff504fc1c669b896b5da10e671c52fb1", 0x2d}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)="37b9c8fcfeb551119e2986243e6979e7c15f5e85de16bc3eac87df29f3e032f0134ec8e70df4dfe7ea4039eb36f1a90b864ad82b57eb5bc056bf01d4eb5de0a6cbbb1869b05fe70bb19710e2bac34ce45675a519a8602604711300aaf19193d347b69f1d4c28caf213ef6d5e778d62a70294e2b74c496590ed7b0c3d731b5c5b6e495cdcf83a5f6a21e88607839099be0d350836e1e2554d48d31febe283ceb7163cef790f192a9049644c9d749a54537de7e05357eca17b8061f733942558ef40d0e3c0", 0xc4}, {&(0x7f0000000b80)="03963df468d4d75f32e74876ec587f14a5f82315ce416dcc95dafd48517e35ff1deaf3fbd0079c7c9ce606f654d9bf4217d5fc6a9dc32578d8b61d5b0353ed8b3c9f2a75c97161c323ca16a9d3ccbdbe0e1d2c0cec5edfc96dc2cdd2ae0186c2b46b14b9c2c538aeccf2a40204ba6a49200f1f72d5376fd5acf210a906e53def126b672dfed98a935b719797474178059802da86371960da3b04dd6340fd528716f00416f9d2261eb35cb236602c55e88d35bfd0523ce21e5d2c239460eb0ccaf9fa233da9974c31e56e9858dc7614e5e90f3afd291427d3d7d306597dd70b30b480d16828b66b4b478d783fc0cf82", 0xef}], 0x6, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000084000000050000000000000014f4ffff180000000000000084000000050000002007000001000080"], 0x30, 0x8000}, {&(0x7f0000000d40)=@in6={0xa, 0x4e23, 0x1, @mcast1, 0x8}, 0x1c, &(0x7f0000000e40)=[{&(0x7f0000000d80)="d9264607ef94a583fcf2bdd6c74f9a4dbcba04fa7c7103cc8de4ef93c91257183633b9057b7c0a0da690fcd748754a0d7f9a4681b792f38439d7bbf80b21c9", 0x3f}, {&(0x7f0000000dc0)="a8d2ab20133d2530007c63a52cbd8ad42075030f0f70c197fed98e42a8ebbaec57021ec31df42919474ecb153a9395fd9389a3c188ffc5a092479c9a63624257", 0x40}, {&(0x7f0000000e00)="9ecf2e09d904173201249944550b3cd2ce6eaa0644e6eda5a8044eeb4c46cd21b8fcf7290777f2fda08701083c5e209681201c", 0x33}], 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000691aa51f00000000102406ff0f000000000000fffffff5"], 0x18, 0x20000000}], 0x4, 0x0)
openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe(0x0)
ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, 0x0)

[  492.013111][T11186] CIFS: Attempting to mount /dev/loop0
[  492.032658][T11186] CIFS VFS: Malformed UNC in devname.
19:58:14 executing program 4:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r1 = dup(r0)
setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x4, 0x4)
dup(r0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0xfffffd09, 0x4)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b22, &(0x7f0000000180)='wlan0\x00&G\xc4RGb\xd9\x91\xf5R-\xf8\x9f-L\x1f\xd4\x8c\x80^\r\xd1L\x17W\x8d\xc4tB[\xb8\x8b&+\x04A\x1f\a\a\xdc\xd8#\b\xb9\x01\xcd|>\x8c\xf4H:~\x96\xd0j\x8c\xdb\xac$\xf6k\x96\xca|^9\x95\x1d\xabyk\xf7f3\x10)/\xba\xfb\x9a\x98\x88mr\xf0\x90\x1e\xce\xd5.f\xe7\x05\xf7Y\x02\xfa\xff\x00\x00\x00\x00\x00k\xec\xa1\x8asq]w\\\x14m^\v\x86\x8d< \x9f>lS\x98.Q\f\xba\x84\xe7\xfc7\r\xb01\xb4\xff\xbcA+t\xcac\xa4\x9b|\xea\x11y\x91\x98d\xed\xfb\xbc\r\x17\x91\x9a\x01')
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000140)={0x1}, 0x1)

19:58:14 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r2)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  492.368615][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  492.374448][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  492.538611][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  492.544457][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  492.938690][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  492.944521][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  493.168636][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  493.174596][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  497.088676][    C0] net_ratelimit: 16 callbacks suppressed
[  497.095882][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  497.101759][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  497.328679][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  497.334628][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  498.208665][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  498.214533][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  498.618635][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  498.624493][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  498.768689][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  498.774545][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:23 executing program 4:
syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2)
r0 = syz_open_dev$cec(0x0, 0x0, 0x2)
ioctl$IOC_PR_PREEMPT(r0, 0xc0506107, &(0x7f0000000140))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000))
rt_sigpending(&(0x7f0000000080), 0x8)

19:58:23 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
socket$inet6(0xa, 0x5, 0x0)
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x4002)
io_setup(0xc32f, &(0x7f0000000440)=<r2=>0x0)
ftruncate(r1, 0x48280)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a000001000000000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36, 0x0, 0x0, 0xffffffe4}])
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$CAPI_CLR_FLAGS(r3, 0x80044325, &(0x7f0000000140))
r4 = syz_open_procfs(0x0, 0x0)
ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc})
sendto(0xffffffffffffffff, &(0x7f0000000000)="59c05a3dec2e6cefddf23c1005b796d05193944d4fd8f690bcebe23c7fa11d53a643a902deec51a9d90995ebfe", 0x2d, 0x8000030, 0x0, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0)
r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$USBDEVFS_DROP_PRIVILEGES(r4, 0x4004551e, &(0x7f0000000100)=0x1f)
socket(0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0)

19:58:23 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:23 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e000, 0xe3, &(0x7f0000000240)=[{&(0x7f0000000100)="c1e9091a4a9eb15b151739eb3c906d6b66732e666174", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0)
setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='}\x00', 0x2)
write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0)
write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796ee", 0x110)
sendfile(r1, r2, 0x0, 0x10000)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x4, @remote, 0x5}}}, 0x84)
r5 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0x1)

19:58:23 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  501.168097][   T27] audit: type=1804 audit(1577390303.268:58): pid=11241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir755456860/syzkaller.ym7LGg/61/file0" dev="sda1" ino=16868 res=1
19:58:23 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x10, 0x2, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:23 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='\xfa\xe9\x00')
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x80, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0)
syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @remote, [], {@ipx={0x8137, {0xffff, 0x30, 0x2, 0x1, {@random=0x1ff, @broadcast, 0x474}, {@random=0x29, @random="884fbdb6b7bf"}, "6cf79ed77ace2a282676d8a3a1a321073716"}}}}, &(0x7f0000000140)={0x1, 0x4, [0x858, 0xc56, 0xee9, 0xff7]})
openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x405842, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000})
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000200)=0xffffb8a6, 0x4)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'gre0\x00', {0x2, 0x0, @multicast2}})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_NMI(r2, 0xae9a)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  501.328761][   T27] audit: type=1800 audit(1577390303.278:59): pid=11241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16868 res=0
19:58:23 executing program 5:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
r1 = socket$inet6(0xa, 0x400000000803, 0x5f)
close(r1)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1})
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000540)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100736662002c0042002800010000000000000000000000000000000000affe00000000000000000000ff01000000000000"], 0x58}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r7, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
recvmmsg(r0, &(0x7f0000006e80)=[{{&(0x7f00000043c0)=@ll={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000006740)=[{&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/28, 0x1c}, {&(0x7f0000005480)=""/182, 0xb6}, {&(0x7f0000005540)=""/127, 0x7f}, {&(0x7f00000055c0)=""/174, 0xae}, {&(0x7f0000005680)=""/4096, 0x1000}, {&(0x7f0000006680)=""/94, 0x5e}, {&(0x7f0000006700)=""/7, 0x7}], 0x8, &(0x7f00000067c0)=""/62, 0x3e}, 0x7}, {{&(0x7f0000006800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006d80)=[{&(0x7f0000006880)=""/146, 0x92}, {&(0x7f0000006940)=""/140, 0x8c}, {&(0x7f0000006a00)=""/17, 0x11}, {&(0x7f0000006a40)=""/216, 0xd8}, {&(0x7f0000006b40)=""/73, 0x49}, {&(0x7f0000006bc0)=""/131, 0x83}, {&(0x7f0000006c80)=""/208, 0xd0}], 0x7, &(0x7f0000006e00)=""/123, 0x7b}, 0xffffffff}], 0x2, 0x40, &(0x7f0000006f00)={0x0, 0x989680})
sendmmsg(r3, &(0x7f0000007100)=[{{0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000001980)=[{0x48, 0x84, 0xef, "d6ca947c44a11cec25de2996b7ea714182662a5cedd8837dddac3023b7004aeb727646f505ef2a8b4c4f9e3310e7a167491b76"}, {0x30, 0x113, 0x2, "66548f5ddc34bd250273cb1656eee92e01e92731cea92111c219"}], 0x78}}, {{&(0x7f0000001a00)=@can={0x1d, r7}, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000001a80)="796438cebe737338ab213fd5d1203ab4513adbd2045ec71377c4a841c65bb5fe6cfb79abd53e7a13433c8bb90fcf603fd7394589973629f11d0a5276b5aecff11ba2a549cd06a242021858e8594375294c868ccae6812242e13f4515789ce7c861b44ce6f545c2d6dab1c84df1c5f7761d9381fd2e8ef5dd4f9bcf1ecb8a47e18cf3c6b4762c54e0e5e0eb798bbab31e04de7bd6864ff946f4e8be3e1b9c99ba6d1e87e22b0321f548f24fab0f4d20522f09f6812fe9a2469ccdee062a0a855144280c2770d760b3daf827e5606f2b43f672c8f45bdaa57945349cbd11864d3ff06d", 0xe2}, {&(0x7f0000001b80)="bd3080e621fd5be9f66943caff6e75af6880b0446f8cd769d6a86c2715", 0x1d}, {&(0x7f0000001bc0)="80a1793507445581b0af0ec451821db0bc779d87829725d80854b9e03ec3f9813f2d324749cbd4ab96ce2838117b5d97fc1f29192cd9913e5e818ed74c1634168fc6f2947907306bf2af8eea0cacc0cecf8f51a62380520af52900e40e95295da594a2d4daee795ce2ac330309d799181cda1e50e33a1e2b327af3a9c618122e8b934f44f7c586473411c11ff0243f2aa6f51416d49deb2499dbf1ec5215239dfa93df5613eed5d90e56f4d6bda330e60eda5d07dd2226d3cf71a99bee839bc38c5d886fd029540a329b4d79ff4e8daec5cae2995bdd9adecaa30d1090b37416a78baf3291aca4772e2dc7d091cbd146491b3a29b7fbd62488c9d6d00999dcf209d82e17b71a99bedc8ff1e0f03e3fe43ad313cd79bea2be5181a3ea9d7b1da82e3b06c415df1cb8a5e0b5950ae035850aad9a6ec58186b2a7a7d1fbc3969cc1b7de27f489adf14f102a6ab8e405b105ce1988f7211fff2c8cd429f322db6a3442083a72e5f8527344a97b3bc0e09a8725b80c667d1cb5d411e0192e7db5acd892301d5adb9d49ee8c72522dee4fb049587db059966d7b3517252c64c539f246cde9f82c6fbcf62f99c32777791dfba5c03c751e9c296771c1d6b8a922a39875a8e4b40ecf2b13ecca468e3c1cecb12ab86aad243feff5df5114284040b4c5b902a5b0c384d4695591e8a7eb8c673ac310ee7f98f1cfc84011e89ae65873f6d5683e632d79620a2344dbf8e0c78ac9c5955074fb06bd44a3432ed319ec17ae1645eead0bf45f1f11ea957815b392d6f84ea8803b60d3f1a306e5d02259a2fef2b68b93bc6b216a7c1ceb71d16939450442672396806117c7f87c5180b1322932a6474e8f3c77a1afdb9a997b75408b26abe090bd0a0ad15ac7fe8ab9feb962d9b557ff553252c74ca239192baadb4ca9f7bc4a4a346ddca76f1a4a9e43226640104b112960c7d96de5a50f38108608c2d61e8f1bacc1c7ec599aa7350da37ba03963114f0d15854a1ef5dac180bcbcb550c7349848ee564666beef55552f1b3dbd07aea4eac63729f0133418657fdf6baf17bc846070f9033082d5fa00af053457ef459287c6a9d79706bf5889885904afc54641509f35d994ee77e664624e56231dbf45255ac8773f91a7d3687ac673e1288709e98e3de9b5f7a509c927a87e83feda12e7044a1fd0ceb562ee2be9470ef0b44ab74145f345f3bc7b6b462b4fdc707fdab1191ff357e95d41bff1176405ba14c84ede35f2317e8437f693e9b961b2a4a69c26c3763a7c939599333e6c8650c5c5d6b8056ff37435dcc1469d04871fb0d3f725bcedd2dad32ea4f5283459984233495ff365420e9832147bba4aca10907514ff340b96d4d56716a72ba05845c98f6cc3ea962b372358772d954ee66e21103592dce2b9b9ebdda4057874ba6d61451265fb4e4f1c78f95157c6ac55a7432b41579f93c658fa4e18fc55c671cd0ee1bbee386aae4fafe1fc22fd02e963d3156c638c001f232a94d3168c06c0d042fe351b3a198b67d1e7872e34c91991eb0cdd52e3cfd25de3317003ebb86d0296cce2b0445c086bb40dd5e5005186721d2eadc2658ace3dd48306340bc0a0506c8597f6bd63212b034a596d085d52b3c509276ef02087a99437c9cd8c3762e2ed05798dc9c95b0b9fec379726f4f8190d31e64135225b65459e16064adf6caab530350fedb56a235b8561ce27cf7ca8277eaaea0fcfffdb890e729fa1662a5acd9a80e559fc09208ed4217880e0f8589bfce233108dd04462cd33c3d68d0b30b8557d123a4cfc03582f000b4688bfcc97c20cebd3e0f45f5589805a1a9ccae4c3f0ed0843f92d6e8d07f1939c8f29821c1cf7413856608911309eb8d74eca1dfc1c04c2aaf3be0f7880c3ee54490e6f742cc46c452a2dbf7f3767679ae3e0d5164c7cd7551351a758e4e1753843a8b2951e928b88dc62c7c43e952feaaf16ccb36dcee39cfa78462438e6548a2fde5f9692e0606dfcf4c9fe6cc41fe1e985dabcae976557a5172db25e5f714c0f363cf4d509c4ac9a97116d8d1720df34e4ac64c4732c347b1518e1b1e54156264feb8567495402459fc8651a7679322c899070765de0dd404e841280a25b590318ce006ac1435c94789cb628075fe50731be1d71b4e8a3040105212314d0c85eacbb04b07b3aff0c27d032fd24283f9f2102ffe122005015ef8d9169043ba4e4ad5b5ad8ef2113dacd02d6a4ae1d33f5d4f31289e0e1d7638d83e1885d3407bdbceb2e31aee0a464acaaec1d853c630fb770b48792c0bb9447a5b9d18e2d13ef8b230058a41c6a1b6c4cf670e0373ca910b793510ccbf6362b12a9c0609332d313eae21fd15ae3bc1da3daf84f725b4b00215ecbad1a7af963c6b1869af9e8fa7b71e79a007a342a02fb5f23614b2ab912cd09d7854e20b5064c1e4373177266a602db1287d9b703b9e99ce7e5f102f677bc701d5d07b72470a212bf887ed685df4e9a98e44d0065eae2bcdb4e2e93bbe605d47af78b0cb7a01889edc02e53dd213eef04b2e90afe6947a4372a5eaf340962ec39bf68f06930825594cb4bf8bb484881aacc31cf50f0799c0309a5a1cf3f7bf5dabd491d1dfa5cd6f71c2efd2c4d6feff4bcf06ea8a8f051154c34c112ee7440ab44e92da16805d9ed28cbc522db4f32c07265a1b0f39d2e392ca8caddd34f13ed60e716978af953e8047dc6652c2dd38b92452156bf3c42487837e2fcf10f07e6e17c4da2cb96239ee7a4bc6abb754e2338f344a7b8e3fd18ed34dcc8d092bd6471568e86d25be041999a8ed36ca8eb9b620d2a837cca8ab4735dc788335a70a9f523d32f49dd22823b7020e1560d4f507dcb03aced6e0fd7df69685b609cfc31fd3cf218939d411b4d9a3ec9f8dbdadd3ea426a4c80ea5a10ea063388a85036331e7641f174af889798085ff1f8ec9368ec1ad8f31959ccb0dfe78814cb8bede8aa9721dd503fa3e5f62a9b99e40e5b71e19de96bab184de5602352fea6be1a3dd60f470adc91366e614926dcef225bbe643f554719a02fd16686be625da3055c0c37b913d85063375d08d77392e27030f74c1e49a609e010537729b583eb6b36c6aa9afdaa1c4a07c80f59ee71f41b6c786e0fa4cb8b4a9db4ab373da6ffce0e3f3878b4d72b58c46002368ecd1ea6181dc71fad2c8cbc178d5439f8a00f9f76759445696268bea48a530db7316794203d9dff1d323d672f497bc2002b5d9fc6af7c467739ef5a9d0c764e3cd4736fdac3266f514f3c0a3677754509701b2602c5f592df0e75118b980060a3b65978b3ce8ea1d09b332de7b7b77fdbc90ab273d46e61d324455244ae38357cfe651a32b8b0f5c0091de486df31d8fbf72badd432bd17eae449f450daae0566eda70948de75f5eb852003ec596489bd0bb2ce424d6ad25d6c72ece490e23b32fa684fd8790136c0ad9890fd816a0cdf32e09e44c2d92bc407057bb300363c00a473373a3db12519f2cb710d43d93e31328cb859ff42848ff26a5dd75a06d8ec20d306e4685a37b297cace13510def7b700bf4a499773fbf426b1cf3e3f3a6fcd5d8b8c3d88af0392d96e03222ba222eb7afc5bbe517baa87f6c1bd16b001779651d811efaf9f7d4b71b6e2dead9035768baba8533bb93851f4345a3df54bc0f8829d156d57e3d6f87b9cc57681093a64ac0f8dae0f1733fb2c356e4e9c5dcd0b0be128f341f2d38c411c348eb23fe3f4cc174fdf1ea3a2f941ad2be3abbc156a9950f98169cf998d54e5ade570e36adc723da17cf20776a8b0dc79bf4a96682999f2baa6d266dfbb73923bccc1906f6cee840fa6f9aee86f0518e87282d03e0dd9e627fe2bc44c6dc54faebd66334e2ceceb10d3984cc01ab3929d2566ab61d639e4b1c9944999e30124bc45e1879268f363f131c116e1002faf21b2c3881725df03cebf0b7b0d5b9228b607b1da92ae8311f8f7e6388aa55779ea8418c98a412c30c4e19f4bc7623ca09d08c924dce79231bc04773becef00fdfde301167d0660ed2c84c5358c011cb5ad308095d5c0f27a046eb1ad79fc8366e46aa65c7c50deee13668e01ea57d29e2a050bbd6083e4084b20b7a9657181ebecfcf3960c2a2bcac4814514b795bae514a337fc54161cfa7c59da96c080df6d9f2eec7b1fd074fd7a8966101029db8e57f5364852f8d5c130008cf098231098dd1f4f195f55bd91b09ab656ae7a4d4d85db8f1190b0c8b62952cfaa73900c0a5c599dbda1289c8179f832f604121bf157346d027b1d031d098877ba206112d06dcb6894b738edf1ea81452d21ba893f883852907c462ec350fc51c8bb7eb34e58ba6b71e5dae2f7b5d30938d8b65c684d2817fcddb20db2cfb90ae84aed0819153d7557e7e917007841a8f364699be1330ec2f9ce7dc5ab36c3f8c12ab2b2ecf3ec6af062334c7fb78d1eb53f526b8788100dc947f64c39ad64e13988e1198fb4db078253b15bf5f8fbbf35f4d62864c99a8d280c97d6d31eff3b7e66acca15220aeef8f5d6b33167d33cb18e3b1ca4e3203826dfcbdf01ac8aa1990c3c5e49ddf35204535ed9feb471f35f7dd93f44268f5e330d2c6d0d70cf3e5850f02779313198a47c2a01c23793216937c776baefcd3c089a14663dfd6bffa89fb4ef94b0a2cad52c150fbdc4dcee567593f34e9c2e5bd801a6bdfd98e42f2d9c26d372b20a09919e552d56c27bc09e3680ce610cbfedb99dd2c5f3cb4d1fca538b48fa8db4d478d21697bf7c6402a4cc4c12c55ff6c507c0db4c09323a5889f39419bd94f696da1fad80946a423e061dbdda69f4a4c6fd9fe64444769ec5a85b96cc550ba0da970a7426111b4db0a99cc581b6977effe369e5e317fa7036ac24f4d42548cab00a2f6d840258e335c77f83617745a39fc4b9e851b7a01980b6ad12a1010e8a7cb476bebaf2683b8b8cf1dedb884fe8b0b2873866251e6c1a59d1fec42c411a266b5d38f7328eb6e4f5ee0bd53c1d692eecbb99247d1b122ae2ea163515e9dc485cd80e11e0c6647c10d27a434689e7ea1dce01d63fbe51cc867a862bd06dec48bb2dbf376d974e3bdea8ea74594d411c9941660b57a89225332f438b2abaa97c8ee139533eebfe4424dd6e7d9f2ffab65096d534a147f31e2205de1c7f90c78b7c3faecc378b77677a447dd4a1f5e68713214e71d191bb0afa85d00b33236016abd881ddfa1880d79d5eb7fe1a7e229cb74a1827f6ca2535fb97a5de97f40cd5e6cd81e65b59a2639b16c0d608340bc47e88f518bbc650a45f79326f5564af9302f705670945becfbf0918992a111b53c4abc3f767574a74146d0a6e9064566b0364e32e5e20dea10e2ffa638dc7ce433303340c1531c9344aa1b820f8470c6124c36fcb8c5058c3b91e07ba183621022827b710be6b68fd894c30c4213adcec3e7ba7ff8bb1b1b14960baca5260cc1f55e79bcca83dd5a68bcfd064a58ae6e698c3432943eacafb5cfba5fd7bf8f7b216a2487751aaeaa7e3d8cc022e41fad0e365a593f97d364a93b5f82db9aeeb9f8d22fdab641bbba504a017ef86acfe7725684ea4334c5259417b533217f21019b37d9d74a947384a2a29a6b28cce539b6fcee1d7a35accc90247a96a3d8eb91496c21a8b1895b22c572f2f7d6affcae5e32b098a82fe0557c21c539b64fa2bad33e83c49dea70a662a56d56ea4cbecb35e38d2d413b407f311d9efc0050e6339d5e947fb28ce578ac6030420ab5877d872a0883664f86690b4cd0330659be7d01b0c14266ba5d10f71cbbf09c9a3b2d578e6", 0x1000}, {&(0x7f0000002bc0)="faf7f4ef6727b91409eb8e7476e2cd1ef7cb0a824825e70b6c86387c8edecd5b5f21cb9597a50c810fb9d3a232e8c0445514ace67330bbe75741538a25b4283eb526fb795e1c128c162c179fe43ce5514a49bdc519e1c99ba5f6a6cd4c5a6a43b257994def15703dc8c898b98c73a64cc672868884067eed", 0x78}, {&(0x7f0000002c40)="fbedd1dc60a78c5c2798a746e18785a3314503821e9778efcee16428fa051a3654458e511690fd2c71d404d0735186de07319cda1b3d09ffdc922886bec410d785b4c637625e7fa8c4e255f0edc667a3fd765fc89e39ea028ab6b887b512e44a0657cfa355cb32f3a087da0c54b61cf66067b844fdb59dc60ae63d5895152fe9c820741d6b297491188a64ea1be5f777813bde4901c36e0b62f9d5b71d6a75", 0x9f}, {&(0x7f0000002d00)="a541edfc98da3a7cacb3aedaafb93bb09bf4ff25936b6d4db89d548e70dd9711fd74119d19cecaed2d49f10859697b42367394a6b3af47a9223d4d68026a9346e4c89602fb931d7fe4332a68c44c8e691903a71859e369", 0x57}, {&(0x7f0000002d80)="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", 0x1000}, {&(0x7f0000003d80)="137ab65d8d621152d0b758e8feb4ea180aacc60cf7fedee64bcff7d4ca85cee5a43cb3272fe4207faa4480b15e371ee677ef59e240c8813f00583d34fe36da05c42680051c1b30a6375bdd374de221298ec770a73bb94af9fce2f5ccee03c685fc30653738", 0x65}, {&(0x7f0000003e00)="321d18d22da7249eeccdcfca6c403ddadfe0315aea2e28c12d3724d25591ebf5b1b4ec8a01be5c5ab5d0417c601dd23eddec5f69a65d6c1079a8b6c8679ba6a0caaba78ba517c56fb2d09bad707b4a32a2b01c92850b760986626087a7f41dde8275e95672b0cd1b37be51c9929f146fe98cdb7f7b40956087f94344421e3f5a69664e8ffe5d9eec58e0e191f1a40c06569f936c70806e118755d8c88f3e27e1ec3b371ca9cd9dffb2a9196460a37d98d2d0f38c87ec50278ded90f5fca9f0a4f93bb6e7327eb67e9bb0c0d35ebd6a", 0xcf}, {&(0x7f0000003f00)="5adbb236e2c0c8b2b4f60b2ec7dd233875e78d6e2c5a7b06aec4eb034dd7a496843d0ae2dcdfa45c77f5c2822dc54344f1ac8dcf0b4620fc38ef07b279808be33cc873efd6015c80bbd94d372ff6c6f086e5520e72721232340e9c1befba218a684b472c8001b33127ca9f3dcea5491c79f7499462ffc2475d3e9787ad694b3a14a1ab726f1b6952ff5031d3d16fed57", 0x90}], 0xa, &(0x7f0000004080)=[{0xe8, 0x117, 0x9, "b70f36505c341a75a79434c5770493b1c2a28a40727de6aec353579cee6e0c8e7f947d36b6c8568c3e08722ebaa99f5226f4538d7f2fac27fd8c130c97a88ec6faad2ccdb087a84f018fdcf797c78ea0a96a8d15ede453239af1503ffafb9a64021895e8ac7e7e910d560623cd531da612e59a9c6ca0aa2d9e4c63362e4eec4a9a3e64512ce9d340d432643b26fc551d8ffc7e82f1f4fae78c6a686ef4a06978943a19bc315cb5af83d42367d4273224c40b959aff91d54ef0b662fba1ce772f4f0324841b2d13369993385029cdc12616fec2b52e68"}, {0xe0, 0x110, 0x8, "873ee967fb0f1a5f30287f95dcc457e087630c4249cf105be9381d6b906eadb04f1eb1a1bd20ec232c54c790fa74358b8ba39a380fb98fd046e91195e34a43719e210b309ddf8e5f577a1cbf38940ed739271f234e7c37095cdab6e2a905dc42034387d899f53833895e14bb01b486103be4049f7e7da2e00e53596f97ab37782c84ea08568244db1cdd35925d3a5504ca51a893454a6ad771eee7f7c8d9597446a6510b1ddab132827715f375562fd885d25b0d1ec9e886e9ed96c5dfa49428ed8288066f421c88d41d"}, {0x60, 0x0, 0x8, "3be7da505f43a781253eedc0b41fe648d1e1519e00a5ac6d2a69ac9b68c5eab1f248888f3d4757235377a565bd9a3ccc970a47fa6a3f1a9be5b0af790f79eb773606553a5b681886485644e2"}, {0x78, 0x20e, 0xa0a, "74a0d60303b03092ff56606364abea2e5716f3efe1648fba43026db3b0d2b1f08d8d171955c500df50a7b4b8b346e5fe5a114dc8cb95bd97a05b5c2be7b67a74c999bad17e0390e96928c3c79dfada8b3e20723460d399f349744319d1732a5cf91ab6c55d"}, {0x70, 0x1, 0x80000001, "5c9cd6a9dfe31ca2a1672c80689a33d13aca01afbf9683ac9b031c2a86b29f0b95c719ea15c6e52d8d6d443d927a9876ebc365b679245c5a61b248477b4932cecab978e8a7666675d443e4ffa54fbc52e87b0ff0ea63dcdabc17b346d9cc16"}], 0x310}}, {{&(0x7f0000006f40)=@xdp={0x2c, 0x2, r8, 0x3c}, 0x80, &(0x7f0000006fc0), 0x0, &(0x7f0000007000)=[{0x100, 0x6, 0x7, "b315bdf054c1112f6517e1baaa441a6269393286d8fc1bb69bfb1a26e6623c149c88834b34b2b80f4201fcb96ad5db93a5338496c6c6a77daa30c3f073cdc673fd8b0dd35184602214570e8a511e8937a7273d6f357cd9c4e670c27d83eef8309e8294afb7ba95b7b7139824dc78193490ead78e5d2e4f2eb72ba5f75ad92c99ad926800565130ecf0381834da35e0834c724a58686221b4d282b6ea438c70de1ac6f1c539c6f381b1dd8ed7757004ad3c161cb601f62a9b3a2e28d3a22f0c63a66e67cfacca1ce4b5587a62774e68b953a573e9b10404d7d2cedf91a5402791b408c28276b5e74a828af1b7edb51aba"}], 0x100}}], 0x3, 0x4000000)
lseek(0xffffffffffffffff, 0x0, 0x0)
r9 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r9, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4)
setsockopt$packet_tx_ring(r9, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c)
openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r10 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0x0)
ftruncate(r10, 0x200004)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000080))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x5}, 0x0, 0x0, 0x0, 0x0, 0xe7}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r13=>0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f0000000040)={'team0\x00', r13})
r14 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/udmabuf\x00', 0x2)
sendfile(r1, r14, 0x0, 0x80001d00c0d0)

19:58:23 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:23 executing program 0:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000200)=0xc)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r3)
lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x1}, [], {}, [{0x8, 0xa, r1}, {0x8, 0x5, 0xee01}, {0x8, 0x7, r3}], {0x10, 0x6}, {0x20, 0x7}}, 0x3c, 0x1)
chdir(&(0x7f00000002c0)='./bus\x00')
r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20)

19:58:23 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:23 executing program 2:
socket$kcm(0x10, 0x3, 0x10)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r2 = fcntl$dupfd(r0, 0x0, r1)
sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x10b, &(0x7f0000000500)=[{&(0x7f0000000580)="b89cf3aaf925e4a51f84d015e79d1d3deb0844e41d519c20d274e39e148690846ed4e44ed3ff7f00009ebd07d41aa43ae71e49c857b534752fd0c464fb18298539372587efb42aacf9ce85f376493bdb4159f809649a1f82a6456a71eaec2e819e49b730", 0x64}, {&(0x7f00000000c0)="026f5710758575c9c8859921246a3bb1f39af76dc01c830134cf22d2b699964fde3590d516cea3ce7a5a8a8d41b7ffe6bfd6df84eaa9a615bafea373f824970682e345d03de9", 0x46}, {&(0x7f0000000140)="5c8218113c73506280eb4598cf0b2da42973b2c3f720c4d0b47728cbfb12ad2c7247ca022f24b58391cc50ca7638b5f1c3e7efc5f988d619af925403", 0x3c}, {&(0x7f0000000180)="d126e9e877a17014939f7dfd4375b09bd433786e9c6c778c2a7e917b4a1ad7db7594ef62ec321f8f7b5f35d3a627ec46154ec958a21daff94646562d61d363e312c9d03503df61c1c1a2f3d75c86688a8f27d55565929d207efb25a9", 0x5c}, {&(0x7f00000007c0)="1e3c2cc6fa4e986188938dacf7bb594b1f3ecd61394cbee0b00216aac943f2569973edecc7e44b0d15a500b3f3829daf7a6a70d14b19cda009dafa177f49caaa7827e8f2b0b63fa0645020177642744d8f9bc77848141578c4a8c7fce5c9d5eb3a98cd07f6c9be3e83b4101a9b", 0x6d}, {&(0x7f00000002c0)="cfef60910efeea65899ccba34207a9cdb55f4fb6c2784c67b6e17aaea4e1b8871e810d7b12d5c44e087b3002c43f0a04987917785acd809e8a74299468a91423857631039e303904342607acbcad551709a8e17b1688de2950298b5ed5b584d7b0060bf9e5be675bebb0689761dfa183aeb1e08b2a5333e019b862d7a2e33e8cf2b0f5efcadbc21762a02ab47f0ac3979b821085209314514ee5ecfd0a762b9eb594f58d0c5089b8cad432ed4648ea65527003e3ece50962a57dcd40998b0e280fa73594c061ab826093a5296f8899000000000000000820a2baae15e236c9122260ad9d18c375b51c30a0c7ad84", 0xee}, {&(0x7f0000000600)="2c72c10e474a9c3e4521a4175c2484fb889413766e1683571c911545b9ddb5b89775fab3336826177d36c31103242dceea2e72897811e3b695170a83ba2dfd5698dc9709548dc335c7511086aee9b1195277bbeb53f218a50d576e64a693bd34c1d3b31cb06cad5496a7f2f1557d6144aed2552dd97fffee20dd0287a0b09684dc7852c4e8ed8c106e4134e82c56da38a075c77bef4cbbb63267f42ca6de03e8c4d7dfd7427c322bf540a7b1c27f743370b688f3bc00", 0xb6}, {&(0x7f0000000740)="647d796f90037a2b28e4eff982a948453467c1ec70d6ac68bfcd3c8e03b85cecc4236efb5f710c227106cac3410d4422369900cb0f405b00931fa22f02a64121b6d4be563235305e8d7397665bd63dafbe4cbe68de0042f4f9d3fa5b062a4c415bcc6e5a4e7b1e6e7681db5bba2498fc1c4509c7578c302207", 0x79}], 0x8}, 0x0)

[  501.833670][T11271] kvm: emulating exchange as write
19:58:24 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={0x2}, 0x4)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil})
r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfc]})
add_key$user(&(0x7f0000000080)='user\x00', 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)="7b00af7c966e4c8df4076345eba21d6f900262cf007ca69f92fe2c7fed99edf284f61c2f7f6f96f38c1a4c1990f63762af1dad4d3f1a98306d864dddb5695d1c290d95819f0d26cc7f48bf55846e261e2c4f1554c556b711a2448f9532ef91c727bd5d2295f27473ed953fb803e3e05cca3250969e810911b62919456d62511a8114f7589f03642d0a68e1022ac85227be8e607344d55e59de1b8f7e6bd548514017c8a09c3e37a5bfcac2a7bdfcc3e80dcab46fb45d7cea8563503a", 0xbc, 0xffffffffffffffff)
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r7=>0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0})
keyctl$chown(0x4, r5, r7, r8)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
ioctl$KVM_NMI(r4, 0xae9a)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}}, 0x0)
ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380))
ioctl$KVM_RUN(r4, 0xae80, 0x0)

[  502.078934][T11287] overlayfs: './bus' not a directory
19:58:24 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:24 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  502.368591][    C0] net_ratelimit: 14 callbacks suppressed
[  502.368600][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  502.380128][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:24 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x240, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:24 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000000000b9bfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000013d4003000000000056040000ff0f000071183049b9ad83006c140000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000269933b3ed696a18f5ecc621efb34c5460c22b07c8b2a03106613cd71d2fcad3d425ffd8f9830c020e008842ac5b1ef860de0260b967f6b38538e086b3702316c2b7b82c3533899ee1174917a8855771d5693fe6eebfe29e9f39f1afbaa48908848cff57cf8002389bb3bf13e9127253e6ef448a5f66d88b8ba211f64a6a507fadb577a401639484876d18ac1056506cb23c50db0d0aa0d54c161a5d2eb823493154f7d4b9e52bcec3d8d2bd9f7695648ed97ede1730c6ef67168af41bd121e1b5abf4f09c53da28601c803432181edaffd72b1a8907360a27f7350d99de2e0f146b20e516a7fd7ae1124fa18ecc0e113b4691bd619b3a4034c6e0ce6578cb293a72125fdd9dcaeca8fb248a33d97ac1f92fd9486a12bbf9c298ab324a57f174da080051a703d71215cf723874783a761bb1d886b8a3e2cc6b8dce922a19b3c7450b52631194627a7fa4e6234631bfe5628e33006e0000000000000000005963"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48)

19:58:24 executing program 2:
openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$tipc(0x1e, 0x5, 0x0)
setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41, 0x4, 0x4}, 0x36f)
r1 = socket$tipc(0x1e, 0x2, 0x0)
setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x10)
r2 = socket$tipc(0x1e, 0x5, 0x0)
setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x41}, 0x10)
r3 = socket$tipc(0x1e, 0x2, 0x0)
setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10)
sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0)
sendmsg$tipc(r3, &(0x7f0000000200)={&(0x7f0000000000), 0x10, 0x0}, 0x0)

[  502.768622][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  502.774622][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  502.928600][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  502.934472][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  503.328697][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  503.336469][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  503.568667][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  503.574515][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  507.488660][    C0] net_ratelimit: 16 callbacks suppressed
[  507.488668][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  507.500379][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  507.738656][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  507.744522][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  508.608657][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  508.614548][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:31 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11)
r1 = getpgid(0x0)
ptrace$setregset(0x4205, r1, 0x201, &(0x7f00000000c0)={&(0x7f0000000000)="0fd3d4a66ba6e537aaad0c432912347bac621b65433d3bfe7a98b66a544fc58400937334018faf7d7d411c4744eb956f765dafdc264fd5704c5fec6034ca43eb24b77c811c6a5740a9a736be002687da092b2938cdf70fd3b8245d8c505b20843915f0dd70cef331ff967caf20c5d9c895a32e496d29ecacf2544c1676eab84070fcfa6d62383086f5d066f264fd4e602e4fd69594eb4d209a793cc9", 0x9c})
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={<r3=>0xffffffffffffffff}, 0x111, 0x5}}, 0x20)
write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e20, 0x81be, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2c6}, r3}}, 0x38)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)

19:58:31 executing program 4:
clock_gettime(0x0, &(0x7f0000000140)={<r0=>0x0, <r1=>0x0})
setitimer(0x2, &(0x7f0000000180)={{r0, r1/1000+30000}, {0x77359400}}, &(0x7f00000001c0))
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x3})
bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xd, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000068c02cfd8a6ff9923d3df309688cae115f13c76bb7ffc937fda85d14e34ccd98630922afd40374042406294e8e7f05e1ae72ca535fb2203e593abaf2b5a98f712d6d59d7dd80f44fbf892d9482e73564189112050fd9a4f509c747d9ca0b5bac0623d4fb51175fc5b2b529011598a8e402771d7186e2a9267de6601c8210c18e149841136eb036d2c09ec24b5f49ab8a00"/161], &(0x7f0000000900)='syzkaller\x00', 0x1, 0xf6, &(0x7f0000000000)=""/246, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$TCSBRK(r3, 0x5409, 0x1)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$VIDIOC_S_PARM(r4, 0xc0cc5616, &(0x7f00000002c0)={0x5, @output={0x3800, 0x1, {0x180, 0x3}, 0x80, 0xc675}})

19:58:31 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:31 executing program 0:
mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1)
mount(&(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ext4\x00@\xc3l\x05W\r\xed\x18\x0fx\xcb\x06~m\x1e\a\x837\xf7\xc0U\xf8m\xdd}\x01+\xce\x1f%\x19\xd1\x1d\x00?\rM\x82\xa2\xa40\xfb\xf1\x88\xa9b\x1f\x05\x1bS\xef\xe7\x04\x00\x82\x98|\xb3\xab\x04I\xacfUh\x87\xb5\xees^\xa5\x84\x96\x94H|W{\x19\xabG[\x05A=\x83\xa7\x94u\x95\xac\x03\xf9\x94I\xe7\x14\xa8 \xc9_\rR\xc2\xe5\xd8\xe7{\xfb', 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x408120)
open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x4957d29e3eac5bd4)
ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000080)={0x1, "6786ecbf970899a61aa365e00cae24f9278f9a8d2b359e693d5eccf1a00e6ecf", 0x988f50c45585ce9b, 0x3, 0x6, 0x400000, 0x8})

19:58:31 executing program 2:
dup(0xffffffffffffffff)
r0 = getpid()
prlimit64(r0, 0x8, &(0x7f0000000080)={0x4000040000000009, 0x4}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000240)={0x7, 0x8}, 0x10)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r2=>0xffffffffffffffff}, 0x106}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x14}}, r2}}, 0x48)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
dup2(0xffffffffffffffff, 0xffffffffffffffff)

19:58:31 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:31 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000024c0)=@bpq0='bpq0\x00', 0x10)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  509.008648][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  509.014479][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:31 executing program 0:
r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000002dc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xfffffffffefffffd, 0x13, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000080)=0x40, 0x4)
sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xfffffffffffffed7)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x126}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0)
r4 = gettid()
ptrace$setopts(0x4206, r4, 0x0, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
bind$inet6(r5, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1)
setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4)
timerfd_gettime(r6, &(0x7f0000000040))
ftruncate(r6, 0x7e)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0xa, &(0x7f0000000200)=[{0x0, 0x1, 0x4, 0x7}, {0x3, 0x0, 0x40, 0x8}, {0x9, 0x1, 0x3f, 0xfff}, {0x9, 0x4e, 0x2, 0x7}, {0x3, 0x2, 0xa5, 0x5}, {0x41e, 0x7e, 0x3, 0x8001}, {0x6, 0xfd, 0x3f}, {0x3, 0x2, 0x0, 0x7}, {0x0, 0x4, 0x1, 0x3}, {0x766f, 0x9, 0x8, 0x2}]})
sendfile(r5, r6, &(0x7f00000000c0), 0x0)
ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000004c0))
tkill(r4, 0x1e)

19:58:31 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000)
io_submit(0x0, 0x0, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x73, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000f905e700000000000000ba60f9002eceff200005050600de"], 0x1c}}, 0x0)
connect$netlink(0xffffffffffffffff, 0x0, 0x0)
mount(&(0x7f0000000080)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='binfmt_misc\x00', 0x2, &(0x7f0000000140)='\x00')
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
accept4$llc(r1, 0x0, &(0x7f00000001c0), 0x100800)
io_setup(0x5, &(0x7f0000000180)=<r2=>0x0)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x129202, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0xd412})
io_submit(r2, 0x1, &(0x7f0000000140)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000080), 0xfffffff9}])
io_destroy(r2)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600)
io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x100, r4, &(0x7f0000000200)="1811041b523405e015fd761cbf6c44222eb9bdc2322a6e2f77fcaea180806ae1b916efbd989b777026800d7ab0084869eee742642c0ca8986ca2b6f4b1815571df1fd8daa65caa3628aca011d135daf8c636892e739400a8a5cc8d16ab5c66389f79d2630700b0ec42f95814c04aeb834713ff8f4b4453cc95fd8dcd39311a86a60b527dbfef4b2d3bf5a9374ff09cf2df6c", 0x92, 0x0, 0x0, 0x2, r5}, &(0x7f0000000300))
connect$l2tp(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x83, 0x0, &(0x7f000034f000))

[  509.168621][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  509.174452][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:31 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1f3, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x25dfdbff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x8}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$ipvs(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0)
write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x100000000}}, 0x18)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)

[  509.254023][T11359] netlink: 'syz-executor.4': attribute type 25 has an invalid length.
19:58:31 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
pipe2(0x0, 0x4000)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  509.506370][T11359] netlink: 'syz-executor.4': attribute type 25 has an invalid length.
19:58:31 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  512.768701][    C0] net_ratelimit: 14 callbacks suppressed
[  512.768709][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  512.780344][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  513.168685][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  513.174662][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  513.328739][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  513.334518][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  513.728722][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  513.734554][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  513.968692][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  513.974546][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  517.276618][T11382] input: syz1 as /devices/virtual/input/input5
[  517.437682][T11382] input: syz1 as /devices/virtual/input/input6
19:58:39 executing program 5:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x284, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000500)=0x1)
r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
uselib(&(0x7f0000000080)='./bus\x00')
io_setup(0x1ff, &(0x7f00000004c0)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}])
semget(0x1, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000003c0)=""/176)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7)
fallocate(0xffffffffffffffff, 0x0, 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000240)='/dev/ashmem\x00', &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff)
lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.impure\x00', &(0x7f0000000480)='vfat\x00', 0x5, 0x4)
r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0)
dup3(r3, r1, 0x40000)

19:58:39 executing program 4:
clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x250, 0xc0, 0xc0, 0x0, 0xc0, 0x0, 0x1b8, 0x1b8, 0x1b8, 0x1b8, 0x1b8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@rand_addr, @local, 0x0, 0x0, 'syzkaller1\x00', 'caif0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b0)
r3 = socket(0x10, 0x2, 0x0)
r4 = dup2(r0, 0xffffffffffffffff)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4)

19:58:39 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000540)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736662002c0042002800010000000000000000000000000000000000affe00000000000000000000ff01000000000000"], 0x58}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r4, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x101001, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x9, 0x5}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0xf, 0x0, 0x40}, &(0x7f0000000380)=0x5877, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x100}}, 0x10)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x2, 0x0, <r8=>0x0, 0x0, &(0x7f0000000700)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000740)={0x1, 0x5, 0x0, 0x4}, &(0x7f0000000780)=0x23e8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x81}}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000029000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=@dellink={0xf0, 0x11, 0xc, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r4, 0x2200, 0x400}, [@IFLA_IFALIASn={0x4}, @IFLA_IFALIASn={0x4}, @IFLA_PROMISCUITY={0x8, 0x1e, 0xfffffffc}, @IFLA_XDP={0x88, 0x2b, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x8}, @IFLA_XDP_FD={0x7c, 0x1, {0xe, 0x0, &(0x7f0000000540), &(0x7f0000000580)='GPL\x00', 0x80000001, 0x49, &(0x7f00000005c0)=""/73, 0x41100, 0xe, [], 0x0, 0x18, r7, 0x8, &(0x7f0000000640)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0xb, 0x200007, 0x4}, 0x10, r8}}]}, @IFLA_PHYS_PORT_ID={0x4}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x400}, @IFLA_LINK={0x8, 0x5, 0xef3}, @IFLA_PHYS_SWITCH_ID={0x14, 0x24, "b45ae9f6572ab733fd48d6b6b531ec"}, @IFLA_LINKMODE={0x8, 0x11, 0x2a}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x200}]}, 0xf0}}, 0x0)

19:58:39 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:39 executing program 2:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
read$alg(0xffffffffffffffff, 0x0, 0x0)

19:58:39 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:39 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:39 executing program 2:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="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", 0x1000)
r1 = socket$kcm(0x10, 0x3, 0x10)
sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0)

[  517.580272][T11393] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING
19:58:39 executing program 4:
r0 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r0, 0x4, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x0, 0x200000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r5=>0x0}, &(0x7f0000cab000)=0xc)
tee(r2, r4, 0x91, 0x6)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132})
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)=0x1)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x32600)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x32600)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={<r9=>0xffffffffffffffff, <r10=>0xffffffffffffffff})
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r11 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r12=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r12)
r13 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r14=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r14)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r15=>0xffffffffffffffff})
getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000cab000)=0x9)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r16=>0xffffffffffffffff})
getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r17=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r17, 0x0)
r18 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r19=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r19)
write$cgroup_subtree(r8, &(0x7f0000000440)=ANY=[@ANYRESOCT=r10, @ANYRES32, @ANYRESOCT=0x0, @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRESDEC=r12, @ANYBLOB="bfc385d3e54af9641793c77d92633904606294276d676654078de123ee5162fcd736cce25c754d23d2f9d66b9af08929894273998a60db8b027056781bf821fffd1ff38773ad4a9870250c90cf2c11341a2eff925bca0154a2f39a17a5785dcac126f43fa619cc575f0c2aa8efa973fbf52825e6d65b11ae70495be3cbda8d6dedbb502c6283ddeca94968296e6171c5d23590531e49274cbc5ad5e6c995fc5bbe2bcd8955952aa69b5e5971a67dbaa5d41f06e24c2dda4e37384f", @ANYBLOB="1b6ed320a7e382ae23fe049ada930c36a9ba1728b2178069d26b5923af9e2c64b76ac2b1481d86cae4633b29d9e26190027f824a198c1b33be7aeff78077087488e98a1b249d90d7599cd5339bc51817f40941db01f2a113bc42b5a9ac1e4a56f56f7f09405ce19afc43a9455cf0b77fa2c6c92f0c59a7b85851bf8bf69b30d16023399d9f6e96ddb416bc8c96cf66ee1c492ee4e14ba3f1e1f9abe9b99e481c1b0662ef706fdc92dd960838a972344a2632e71f7d3c65729b6972e23fa5ad99f0023db9d442c1e9520e3b8cb33dc214d347b9fa941aa430a16aef4b", @ANYRES16=r14, @ANYRESHEX=r9, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRESHEX=r5, @ANYRESOCT=r15, @ANYPTR64, @ANYRESOCT=r3, @ANYRESOCT=r17], @ANYPTR64, @ANYRES64=r19]], 0xfffffdfb)
ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r6, 0xc0305615, &(0x7f00000000c0)={0x0, {0x906, 0x6}})
close(r1)

19:58:39 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:39 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:40 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)=0x1)
sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000000)=ANY=[@ANYBLOB="0209000002006deaf3837e6bfe1b5fa8501f3cb6c3dfa45f4bba010000005b8279112065b9830cc25b983335312000"/61], 0x10}}, 0x0)

[  517.888637][    C0] net_ratelimit: 16 callbacks suppressed
[  517.888646][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  517.901317][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  518.128619][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  518.134556][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  519.008680][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  519.014606][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  519.408720][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  519.414595][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  519.568687][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  519.574646][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  523.168684][    C0] net_ratelimit: 14 callbacks suppressed
[  523.174414][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  523.180236][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  523.568688][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  523.574467][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  523.738648][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  523.744989][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  524.128624][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  524.134415][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  524.368638][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  524.374690][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:49 executing program 3:
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0)

19:58:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:49 executing program 0:
socket$inet(0x2, 0x4000000000000001, 0x0)
r0 = getpid()
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
bind$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa5, 0xfffffffffffffe00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x72)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r2)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1')
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080))
write$P9_RLOPEN(r4, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0xa, 0x3, 0x3}}}, 0x18)
r5 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r5, 0x200004)
sendfile(r2, r5, 0x0, 0x80001d00c0d0)

19:58:49 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="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")
r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xfff, 0x400)
setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040), 0x2)
r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x90800, 0x0)
ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f0000000200)={0x1a, 0x1})
r4 = accept4$tipc(r3, 0x0, &(0x7f0000000300), 0x800)
getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f0000000340), &(0x7f0000000380)=0x4)
r5 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x2, 0x81)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc)
mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x13, 0x4000010, r3, 0x100000000)
ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0)

19:58:49 executing program 2:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="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", 0x1000)
r1 = socket$kcm(0x10, 0x3, 0x10)
sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0)

19:58:49 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10)
syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={<r2=>0x0}, &(0x7f00000001c0)=0x8)
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x401}, &(0x7f0000000240)=0x8)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f00000002c0)=0x104)
sendfile(r3, r4, 0x0, 0xa07)
r5 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x2, 0x2000)
r6 = fcntl$dupfd(r5, 0x80c, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000340)=0x1)
ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000280)={'\x7f\x000\x00\x04\x00\x00\x04\x00\x02\x00', 0x20})
ioctl$UI_SET_RELBIT(r6, 0x40045566, 0x2)
r8 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r8, 0x4, 0xffffffffffffffff, 0x8)
sched_getparam(r8, &(0x7f0000000140))
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x1, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x32600)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000080))
ioctl$TUNSETLINK(r10, 0x400454ce, 0x0)
close(r7)

[  527.094742][T11446] device nr0 entered promiscuous mode
19:58:49 executing program 4:
r0 = fanotify_init(0x0, 0x0)
r1 = epoll_create1(0x0)
r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
fanotify_mark(r0, 0x65, 0x1, r2, 0x0)
r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00')
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r7 = dup3(r5, r6, 0x80000)
write$9p(r7, &(0x7f0000000140)="f35cddf617a894b4fa278eb9da28326f1a49c255f1ee27081e387e33154081ac9b55ed3d9c1dcf8496c54cfe889b6b191fc9ca250954875d52102e19aec31e47c6974b6cd1ae9c36df9b6e0e02006ac51a3f1096569d1b6e8cd394fe467709bebc4430ff77fbc334bf8d1630c465d6e5f2ae49ddf2170b872fbe643822faf2bcd88ca4ff3a05e196d5c650ed47506ed0b153289d53ad348792345c3a5adf5a1b7bf558612edb52c6ef61caf9ad5a699b0c202d1dce1f3d9a72f1d321cb2759a8395a8a5fdcebbdec1fac3f65c55879af7b472dcdc473aba50753fd278b182e2afedbead4aba1920dc8ffa389de91ad39007df3652f870a0b5aa559185fbcf0523735ee7dbed41c40bad32e6bad1225998a08691d56f04a14979e02b5df9b6ff0aeb2f32f0ac76f0a14f59b7a62dadf586acebdcab69c35d669a99ef3be6546cdb7d4697898c07bfda98e751facb6b4b8c1a49664e9aafe6a27a6b08eae2028a98e2446c2cc3c7d5b38c1167087eaaae5493c2b1f7638cc02208aacde9df64d450e484216be2f442f7a74f8caadeed9fc0f7792ee333a296619f081d9a76b678b2021438f6b82b89d11c52be6dfb6cea2387a3142d61960deef3fb25997a01a80fb19315c44dbf51f1225ad60f25d6e4c2cae9f128710b3eb5af662745ee8fc993c9bb2066a31fb570a8e4e40497ec8d803b0bd3e3bf401c471cf18819af1ccabead8b7ca5f81a038c0c701cda4397c81f7a9c8c742cc0f5ec60951828a4e1e74783dd18a3bf3ec6c9aa6647ae46ae293da36a7624d7964ef2a957c9fff18ea60fb1dea6d6eb88bf411f9e2a5c5734232f775afa7a9d4189affb56e0b7447a0a8149e9bad0c7d5ef991b5608ab7e09043f3507a37b0f4449c93b7f52cb00997463b3779c83d45bc63c86c88347a08106c0ed86d4b6a458d963fa98da78ecb35a0945be4649dcf70080287fe84da123181ca30b79a2d87f14471a6c4725de9748be76979a93d9a4e206c066f77bf6d860d2e45f724744f6324dd775dd05be51a47d8d1add91768a789b2abe3aac5cdb8aeec643906b49eb98d8c67c9a91fa39a43cd5c12ec1a8dbaf0253bc9c5dc048cd9cc18f685e99d1b122a93e8ccf4fde1b5dc8108a5b300b82e0a056f16da04fe9abba60b96fee799f3bf98ceef931294e06ec40a5304df872ceecd1e5b30ad51ebdeee8319f479c4e69a6a124261b5c67a67e5f36d7bc514d36e2e201b1d99e02bb17dbbf19e5792f697936a402627d03ef5e67f84fe1fff59912e31580690610215f8023065731c250c66604799c0d5c7417750060ce6423624b5c83a5d4384f6442abfcd0e9b3998afb216ada402bbbfa611f384d6aae2290687164b5d08cfbec71389f0e10a9c6eaa18e40c6e0cb29555715cb553b87edd98d6420abe34e229bf6bbfe01440cec07933848b162d58d8cf30f4a5886c3ccb53b74da85fee46d2beff9fe9057a6caa2fd8956066f78488f3fe743a61debc2e37d7f4db2a634a0e637b9390b566eb12246c7acdfed79d3a366ead75c7f93fa4820ed8176e5ceb98912c03454705a4f8fb074fb94cfd593cc395b8e39a94b284ad9c38b67cdd37bd2330ac36398a24dbddbfb0aa6a3c0e59688208f7e58ac32c9cfc0e4faa09baab749c49ccfe630f29ee0ece3170f1f05d20ff6671e9f0672d1fef0c26bbdcf2cd3df11ffada258042eb93c03d81feeb9894dfd8cc4a6d94cb4d0f3dce8d3445ae102148a3781b4676e0fbb3c755f54f0af641dbc6359d6d64db334d5e157f79c16dc3bdc6fbe14fbe87267dd0d6f3d47684a3cf5cb08549d14878b75f9d48af230986ca212c7ab1ad71172aaa91d4792d3c38a9dd83539ad8b09e5054ceed05b3ceea22e98ac4039aa595a74fc044ab23df1155abf85cef9ebd0717409ab7858a9f6f7461148087cb0b4bb8f8bb08a0b9f5a4181dd201f5c934c4cd2cbdd9d62554ba1ba280b6a7dc1796692cb45e93143e2cd55f36f2b82ee14cd58bae68d7caff741906df7f7e83c56beca1613fea28707eef4dac858ffef70d69fedec2dccf4ba3185bebadd7029831316ddc81565ab2305f9ac0eef9ee710cafded762299d1650d17723dd632b5fb84f63f55e723b958fa547c37874d8a51253ba57b7f76403f972413952c37acb3c7ae61eeb47bb39bec9caac3d1774735061db135bea18a14470def7ea1df8835e255c6158085634fd0ba1cc0fa4b735886388b260934140c5288ae71fc244f194abbe6181825a242a9f76a208a29c70e7a06684a26d6a8f9ef26aebc71c69d142932d6df39055ba9315fdce514bdb8358f418e601db5eb8948d1e973fac24a1c92533244261ca23c9f57d813ce4dfb40c719390fe6cf78fd2bc8ac62205dc9b5b1ad4634ca30d38ade9e0001e2400919e825afe4cd77c5473c33753507e8b0547c6b5fb38fea0650487b3f09e31849ed0e7ae4b133e798a5f679924e4c9d6ae21b61a1ae5bc92201e48b701e70a00276d07fa6daf0ae7d7de5ca4aad2a162e67343c3ac48141863696a5b32a180e269d76236c211b884ad58b8a4ef2d800307348de2d9fff37ff77a11bb4b8bb56a08c12db390a70718777ca083bc138684b3e94fb97d026b89831c8c5e2855849e773ef3c03eda42f01ee1f19a57f1c729c3eeb8775a5819f20d5ffaa3ef349864e189a130751d169adb85b5417780febdf2ad0385ec602f18966171107132185cc3f21ef42129f630b446b27f4285d78a755c5c32d73b224b09e57db4e6b6c0c2e4b29cb58be9d6427dad0efe6188e92f4c49963d639e05cd206c909639491ab250d274848ed25d535b81a70769987a491b07fd9c0cde287da65fbf9d8bdd13aa2383ac6583f2afbc0639252736806acf6b130f683957d87a65c72c092a39d0997050722286891760bc7bc5560809a318139b453eb8196b6bb50cf27992e91cf10fb6126445029c0acfc9f13599aeb714235825221203e29da81dc363fb31ec2b9706a3a77075666e82f55dc5b0eccf4fdaf22511ab85967caee8ab9ed86f653a7924c9cbd24471ba377e3df28d0d2d1cc306e503897e734a97e62682511b3734465635b6e680a270debeec5930347709f16eb07f76a4831b5a54bc5488e421487215c2e0d445a6b1eafb4f697b031f920578e00aa81b3e91d692aadd4fad636c8740617d3f3ffcbe61ae8a28d5e56dbc7c760698c7f09c811c50fe29444e772f568d9a8e9a78d5b74f62ea85bf90baae063d570fb226ffe869f01a25455b81fb6dee6e0db511d32ded29ff805aa8c5d5e136066d5a842a7d65432fb5f43a8d42e9fb499152f793f6cb1ca5175d5cbfca12c6d12d490195bd291880f31ca3afdf822a5292d21ceaba7c04c16e359d94d39fdbca50ef858dc9d8ed508f6730ce38273d29e822630943d4678c9bcb59736d6f0707a2cbc6c369344839887e427835ddf1ba76ab9096eac7376ae296d7a0ea1d960fb3b8510a258c6a1c14aeb4d2ef48e42eef59b994a2fc4bef14464f0ee5362a8c1c39ed38b410e59f3e9d1468001ca7a85627beb619178cd4225d4e6b561a8ac64edd6e589220d3bffc5bed4131ae9a6b27c1bd2050c7cfd041ae1bd8ec8bb2bf72cabdc4df9ccd17d13c80539f61a3f2e3f889697c9577ee7cae2f8acd45042cd2abbadef39a7ec038c9745a15a755ba9540b8d785fe0c4a984d6f83a949e79755707a7439558aba30f47107e24ebf2c541ff9bd9bf64e3fb77486731af392938ce9ab965082a80eeba70637042311fe50d907e64a459d4459980a49e2d46d7ce1018ecfbf4fc6e01f84e84b8324816b4ca567d09332267ed23735579b8d0313cc798d2e3e078b9b6613820338f1c13d80281ec08d1bea30cd007d04ade26df5da74ef35428aa8e9c784ac8a880900f65e61aaa86f324ed72c4bca302b0701aa31d49a094d003d0e253e9582b1ac5041adcf80df36510c2def31d2f732a05f19e1cc45d87ba484235826d0634a024d9293b7706faedaec3693d45b12581741ad9aff371a3f0f40553e2a119c120da7816b11a87940a225a7961d3730d68baded8285dc3af4d5fd358fe7c59ed936e47532ce4632c49c401079c1ae1f0e20a6cfde7a1fe1268c10748512f582e108629f489dbdd8847a812968946cdb193a297f58d503844b8d74523893264c32de1dfecfd895849adbf5dd3e7c44b25e4af5afb54e3a24f9abb21a9a76e715d9c5df95e6e86448aa43c8f9d004a755a313bc112d05b6e7987a6b7a97fdcfb62cea0b56183e7e3309a91744b521f719fa8f10a3c1242414ddb86cd6566fc3000e1cc17856c26b84d0856b20a4fdde809f48bc03f9ffd9a56ba06d21dca404c13f17cf4e729b60e7d5c694996aa834b59a748e6acb81f0247f937a2bd4a73c5c2e00bf98d459b55031cbe362b28c9567b69dd4f65fda693b9914612202835e68de70f6d5ae40a62d02c3a63ee4aabfb2298cf6573fef9225cf92b3114cf9144d80b11389c867e39b769e7b8d22b49cc2c7e534344b027cb073023abaf2ddee82836ef5bebf11ad888257d80d9fa717d0961975736f4a4dceda249626d1af8327011d7649cfaf0cd61b48eb6a8e21e901086b586c7f927fb5cb5351b4a1d73cab78b4110cea34eb002d35bec512a146b28a9966ec58a70d3d82d08a36c99d6c7a3e7cfb5d4928f5b84703363e0e8bc65f8d12308ef2e3f0a98c5c20d1332700177161853c2c17bf66c056d03a225aa8b1a4ad0da9c262d0a3727eb05b1d1633bdbf9b6bedcc76295f56cd6ba6779fd8686430abf16d6f6303516fda08a1480f471307de81c5dfb9a08ca6425053d57b91083d8ad8a1f31921d286e7fe64b40e0ab4771e890faf5e4100bcc847e5a80c6d64c25eae89ff8223aab7f4b9b73450aed06f66a046f37cbd5398aad0d7290ec50e315b77449c4ba15e808d67f46446f1067b8fa842b57c116b1a350fe780cf9248a7ed54c3ee9033632cbd707c83a3ca0a6a0ba00a3c6b032f4d7cba480db355e6a1346ae2eeb8378da188f75939ee7990a89836c4ed2ba71978aec8b20d50cac5332bb1ab834def64fa1dd0b5f5a1a0246da81777562c9bed5555f1d6db7ca32a2d72b242e2ff58e02cd06738f110d59caf0325e74195da4d89c3667d14302d4cd03e2c12f18b0617c2a4c1163b9fe78525a801b3d8f43488bc8f7f0580c8af8fcf0bd7809e852540f9c81ef55797baa8d78cfd7302dbefe7661f51a7996aa97f43e2ea0bffd4ded47ae79dee22043a6d235b33073f50b4ef8e19a7464c9b074ba465c57bb02e15d2b4baac543692ec3605070ab7eac94d6504be7112b4166f7dfdd2ce98d4da4ca41f2c8109fccd4f435b31b5bca78907d2deb9e02418456baf3f9f57a387edde0669076e98379036c3dc60f47b8f763b8f65af279f70098593061c088012bc05ccaf9e8078363551e83b7dfa60b85a69384f64abf29ef7a90c7dd927aaf60bf7ee3f09f7c81287f4583c3a5de72ee32c8d9ff1e3097fa49b6e039b5bcdf47e18abd7c08c04e98f6eaa482d875508a9d20a4e01b34ddc9a2cf9b6b49be5a4818090a88ec3a606973a10140c37ef3f04467c1134ea789d093b68b5814e5f44a54d6d98c23c68db562944ea31ae60345e2aac40215e3cc78b696a1815c8a26a42a123c996bbef5594af0f2a252ba43550bbbc14050e82d0c89b2ac0dda9fed10b9cd44c03232620becbe79c87e17ef716da086c66112a15693212a209bbb53fca34bec698701475c716db16e0e54b1f444177b03ade98a6fd9e681f53a490c730d5bb", 0x1000)
r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
sendfile(r8, r5, 0x0, 0x209)

19:58:49 executing program 3:
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0)

[  527.158072][T11449] sysfs: cannot create duplicate filename '/class/ieee80211/���[?!'
[  527.237902][T11449] CPU: 1 PID: 11449 Comm: syz-executor.2 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  527.247856][T11449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  527.258101][T11449] Call Trace:
[  527.261492][T11449]  dump_stack+0x197/0x210
[  527.265901][T11449]  sysfs_warn_dup.cold+0x1c/0x31
[  527.270956][T11449]  sysfs_do_create_link_sd.isra.0+0x120/0x140
[  527.277050][T11449]  sysfs_create_link+0x65/0xc0
[  527.281907][T11449]  device_add+0x756/0x1d00
[  527.286608][T11449]  ? __this_cpu_preempt_check+0x35/0x190
[  527.292452][T11449]  ? uevent_show+0x370/0x370
[  527.297143][T11449]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  527.303565][T11449]  wiphy_register+0x1c46/0x2720
[  527.308550][T11449]  ? wiphy_unregister+0x1040/0x1040
[  527.313827][T11449]  ? retint_kernel+0x2b/0x2b
[  527.318525][T11449]  ? ieee80211_register_hw+0x150f/0x3ac0
[  527.324184][T11449]  ieee80211_register_hw+0x157e/0x3ac0
[  527.329674][T11449]  ? ieee80211_ifa_changed+0xde0/0xde0
[  527.335411][T11449]  ? memset+0x32/0x40
[  527.339424][T11449]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  527.345743][T11449]  ? __hrtimer_init+0x13d/0x280
[  527.350711][T11449]  mac80211_hwsim_new_radio+0x20cf/0x4340
[  527.356473][T11449]  ? hwsim_register_received_nl+0x420/0x420
[  527.362569][T11449]  ? hwsim_new_radio_nl+0x29f/0x1070
[  527.367884][T11449]  hwsim_new_radio_nl+0x9e3/0x1070
[  527.373107][T11449]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  527.379372][T11449]  ? mac80211_hwsim_new_radio+0x4340/0x4340
[  527.385358][T11449]  ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300
[  527.391729][T11449]  genl_rcv_msg+0x67d/0xea0
[  527.396256][T11449]  ? genl_family_rcv_msg_attrs_parse+0x300/0x300
[  527.402875][T11449]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  527.408577][T11449]  netlink_rcv_skb+0x177/0x450
[  527.413377][T11449]  ? genl_family_rcv_msg_attrs_parse+0x300/0x300
[  527.419819][T11449]  ? netlink_ack+0xb50/0xb50
[  527.424432][T11449]  ? __kasan_check_write+0x14/0x20
[  527.429744][T11449]  ? netlink_deliver_tap+0x248/0xbe0
[  527.435057][T11449]  genl_rcv+0x29/0x40
[  527.439061][T11449]  netlink_unicast+0x58c/0x7d0
[  527.443942][T11449]  ? netlink_attachskb+0x870/0x870
[  527.449082][T11449]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  527.454924][T11449]  ? __check_object_size+0x3d/0x437
[  527.460152][T11449]  netlink_sendmsg+0x91c/0xea0
[  527.464937][T11449]  ? netlink_unicast+0x7d0/0x7d0
[  527.469940][T11449]  ? sock_sendmsg+0x6d/0x130
[  527.469990][T11449]  ? netlink_unicast+0x7d0/0x7d0
[  527.470005][T11449]  sock_sendmsg+0xd7/0x130
[  527.470021][T11449]  ____sys_sendmsg+0x753/0x880
19:58:49 executing program 3:
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0)

19:58:49 executing program 3:
r0 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  527.470046][T11449]  ? kernel_sendmsg+0x50/0x50
[  527.470106][T11449]  ? __fget+0x35d/0x550
[  527.497814][T11449]  ? find_held_lock+0x35/0x130
[  527.502618][T11449]  ___sys_sendmsg+0x100/0x170
[  527.507324][T11449]  ? sendmsg_copy_msghdr+0x70/0x70
[  527.512455][T11449]  ? __kasan_check_read+0x11/0x20
[  527.517508][T11449]  ? __fget+0x37f/0x550
[  527.521793][T11449]  ? do_dup2+0x4f0/0x4f0
[  527.526069][T11449]  ? __fget_light+0x1a9/0x230
[  527.530775][T11449]  ? __fdget+0x1b/0x20
[  527.534871][T11449]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  527.541141][T11449]  __sys_sendmsg+0x105/0x1d0
[  527.545814][T11449]  ? __sys_sendmsg_sock+0xc0/0xc0
[  527.550865][T11449]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  527.556379][T11449]  __x64_sys_sendmsg+0x78/0xb0
[  527.561274][T11449]  do_syscall_64+0xfa/0x790
[  527.565801][T11449]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  527.571719][T11449] RIP: 0033:0x45a919
[  527.575627][T11449] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  527.595242][T11449] RSP: 002b:00007f3e97b3fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  527.603769][T11449] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919
[  527.611841][T11449] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005
[  527.619846][T11449] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  527.627832][T11449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e97b406d4
19:58:49 executing program 3:
r0 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  527.635817][T11449] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 00000000ffffffff
19:58:49 executing program 2:
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="4da1e7aea3651c1f0dc68a478028965d5edb8daff6b1134d993d34edb24083c04e7b76f807ca1b839b754b084cc1d212d20a22bf0312ec1270dc08baccd4f3ff41a14105a4ddcf9b4e7456128c165bfbc137cdd383ab35d7ec1fdabc0723"], 0x2)
perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x80c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

19:58:49 executing program 3:
r0 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  528.268406][   T27] audit: type=1800 audit(1577390330.368:60): pid=11495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16802 res=0
[  528.288636][    C0] net_ratelimit: 16 callbacks suppressed
[  528.288644][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  528.300337][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  528.528635][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  528.534526][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  529.408622][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  529.414461][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  529.808669][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  529.814554][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  529.968708][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  529.974551][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:58:52 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:58:52 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000017c0)='TIPC\x00')
sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x34, r4, 0x501, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz1\x00'}}}}, 0x34}}, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x31a, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x27f13d40d253b370}, 0x4000000)
r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r6 = socket$netlink(0x10, 0x3, 0x0)
r7 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$PPPIOCGNPMODE(r9, 0xc008744c, &(0x7f0000000240)={0x14332, 0x3})
sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="48ffdf35000010000507000000000000000004000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="e371a01c7d83e16db1918b5328546fd0db633ad73f48121530e272e1e1c5c2d6513819000000624400000000000000"], 0x48}}, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r8, @ANYBLOB="800104000000000000000a0014000000"], 0x28}}, 0x0)
ioctl$KVM_GET_DIRTY_LOG(r9, 0x4010ae42, &(0x7f00000002c0)={0x2710, 0x0, &(0x7f0000ffb000/0x4000)=nil})
ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000400)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2})
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r8, @ANYBLOB="00000000000000009ced1c2269c340608c0929cd7503b59d60f62914e1205e41882e14da2dde12b712e94fc8835ad295eff927bdafaf1dc33106f656fc380746fccbb525f5a8ecc120986d8f2e8eb5585e989d9e75f1d378601a02911659e781b9bd"], 0x20}}, 0x0)

19:58:52 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:58:52 executing program 0:
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0)
setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000140)={@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x4, 0x2, {0xa, 0x4e21, 0xfa6, @mcast1, 0xbfa9}}}, {&(0x7f0000000040)=""/181, 0xb5}, &(0x7f0000000100), 0x1}, 0xa0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b<zP\xf5\x96\xb0*5\xa2\xd6\xf2Ym\x13\xf1qj\x14\x9e\x9d\xee\xd9X\xf7{b\xab\a6m\xd2%\xebL\x1f\xb3m\xde\xddUC\x984ZZ\xc4\n\t\xd3\x0eO\xa1\xbc)\xb0n\xe85\xa0\x95\t8\x95\f\xa3\xca\xea\xe8^\xcbj\x1d\xc5\x17!\xf0`\xefHz\xddl\xa7\xc3\xcb\xcfM\xc9\xde\xechl\x11\x81\xca2\xe4\x1e\x006\xc61\xda\xa8\x87PQ5,\xba\x87\xda,\xc3\xf3-Xl\x12\x8aY\xa7\x9f\xa2-3\xe9\x1a6\xecj\xa3\x12\xea4\xbb\x99\'|9I\x9e\x05u\xe5\b\xd8\x1a_\xd3\xbaRY\xfbgp\xf62\x8a\xd9\x8c\xd8\xb4\xa1\x1fr ', 0x0)
write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8)
lseek(r4, 0x0, 0x4)

[  530.075870][T11505] tipc: Enabling of bearer <udp:syz1> rejected, failed to enable media
[  530.103991][T11505] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
[  530.136390][T11510] tipc: Enabling of bearer <udp:syz1> rejected, failed to enable media
[  530.146729][T11505] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
[  533.568705][    C0] net_ratelimit: 14 callbacks suppressed
[  533.574426][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  533.580238][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  533.968697][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  533.974514][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  534.128738][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  534.134560][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  534.538739][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  534.544581][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  534.768675][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  534.774612][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:00 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
write$cgroup_int(r0, &(0x7f00000000c0), 0x12)
bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x0, 0x3, 0x0, 0x4, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0xffffffffffffff7b)
bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$kcm(0x11, 0x3, 0x300)
recvmsg$kcm(r2, &(0x7f0000000040)={&(0x7f00000082c0)=@xdp, 0x80, 0x0}, 0x20)
close(0xffffffffffffffff)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$kcm(0x2, 0x1, 0x84)
close(0xffffffffffffffff)
setsockopt$sock_attach_bpf(r3, 0x10d, 0x10, &(0x7f0000000000), 0x4)
recvmsg$kcm(r3, &(0x7f0000007ec0)={&(0x7f0000007bc0)=@xdp, 0x80, 0x0}, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)

19:59:00 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, <r1=>0x0, 0x0, &(0x7f0000000340)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000480)={0x5, 0xd, 0x1, 0x3f}, &(0x7f00000004c0)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x5}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r1, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="b7000000000000f46f000000000000009500400000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000003c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r1}, 0x78)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
epoll_pwait(r2, &(0x7f0000000040), 0x218, 0x9, &(0x7f00000000c0)={0xe00000000000000}, 0x8)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r5 = socket$inet6_sctp(0xa, 0x1, 0x84)
r6 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r7=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000280)={r7}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000040)={<r8=>r7, 0x68, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x4, @loopback, 0x8ad}, @in6={0xa, 0x4e23, 0x2, @loopback, 0x80000001}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @rand_addr=0x9}]}, &(0x7f0000000180)=0x10)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r8, @in6={{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xd}, 0x7fff}}, 0x8}, &(0x7f00000002c0)=0x90)

19:59:00 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b0", 0x4)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)=[@iv={0x80, 0x117, 0x2, 0x69, "b31f79b4f463433515bc0e24291ad057eecc7c287bf38c5f8864765573715b2fe83c119b1e54f644f7f4d2507156be6393361fb7bcc2b193def3cf5073240520119c97b7e868e4c9a51a9434f7ea4e1bcc0e70f0651e41ff20aebbe5419ac9b3fc6cbd924cf50c61cd"}], 0x80}], 0x1, 0x0)
recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x28a, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x500, 0x0, 0x0)

19:59:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0)
ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0)
pipe(0x0)
r0 = socket$inet(0x2, 0x4000000805, 0x0)
r1 = socket$inet_sctp(0x2, 0x5, 0x84)
r2 = dup3(r0, r1, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r3=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000)
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
socket$nl_generic(0x10, 0x3, 0x10)
socket$nl_route(0x10, 0x3, 0x0)
getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040)=0x1, &(0x7f00000000c0)=0x4)
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0)
ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000340)="9141e35ad8e7f745fdf61d69c20e0315e03eee38a9e1712983bfab5bd29ac276dc8f91b9f3148ec5df8bb594767dce362fb7677ef7c898b5809fe032bc19dcb49369252d2b12c5ac1e5877b0bfca581b4bcc2fa817ab3ed22ada2ad172687e9c0d406f76af9ba8d9ec8b69d7cc00bcc0dce7a7e631d9c4af239cc45a41f52cd112df31414fe936bdfb2f4f2f569b89b3c46c8690196f64cd686c71e9ca30121c706aba52dfd3d707c34011b80da4f452b8ab293d92edf680da20a96b4578e67827223c9e6e771535")
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa)
clock_gettime(0x0, 0x0)
socket(0x10, 0x0, 0x0)
socket$inet_sctp(0x2, 0x5, 0x84)
socket(0x10, 0x803, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0)

19:59:00 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:59:00 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  538.688645][    C0] net_ratelimit: 16 callbacks suppressed
[  538.688698][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  538.700202][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:00 executing program 4:
r0 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10)
sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="5800000000000000140100000900000000001a002cdd00000000", @ANYPTR=&(0x7f0000001780)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'/54], 0x58}, 0x0)

19:59:01 executing program 2:
r0 = socket(0xa, 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\xa4\f\x00', <r1=>0x0})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001400210100000000000010000a000000", @ANYRES32=r1, @ANYBLOB="080008000000000014000200000000000001000000000000000000011400010000d80000000000000000ffffac1e0001140006000000000000000000150000000000000064d63eac5630b44b982d72d5a7bed249f8e8a719c52e830cd7d1a8b78a153672d4b9c24641ca7fac2386f2742c3219e12f0fae062e04b6d74d05cb1602cef7a2ac40f1712a8ee5cd77d97511c05455e0cb1951330e77ee011412f4ab2a0f71ef1291f4810edee56ef8be66b500ef99fddca11ba6dbc9f76d7ad1eb7277b09f3a1a27f0747e2174a62bd5ebda4a69ea7acb968fc613b61a32685a6591cccc9ab1a8b4c79c5be19ae1a3b90bf069a627de67e84816d5c952ab0f4fd6cbf8afad1d422f3e169a323450f78baadee9431c5d8b302d51cb4058edd4094ff3f985e1edfb3e9fb4654d87e51d5cd585bf3a69b9f88123a91a6e2e2041b478f30a9d206a67c750c11ea00e7c06075d95ca7516a6b64cb1f7f3ebb81924114bad4b5d053b5ef1b87eb96df4f664f88dfd926c5eb9a5d3b1cd39cfb10a3c59e4462c596766d9af8d29e5cec32219628787dbdccf362cb9082e306edf8339ad2d77f2f397c58476e3b489c9db7feaeb72b576ed73b7f130c0a5546ae9a76c4eac5e84120094a326e07d133088b3f552ce8e6d5d3821e7b9044fd0792137f5391416a399e5989227e0c5c19eaf"], 0x5c}}, 0x0)
r2 = socket(0x10, 0x200080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x2}], 0x492492492492805, 0x0)

19:59:01 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0)
r1 = socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fff}, 0x0, 0x0, r0, 0x0)
r2 = socket$kcm(0x11, 0x8000000000000003, 0x0)
recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000b40)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000000840)=""/84, 0x54}, 0x40001001)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x800004}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x4}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000240)}, {&(0x7f0000000280)="783271530de9c90ade7a4eae572e518a81ac6aea9bb683c8", 0x18}, {&(0x7f00000004c0)="a4e26b358e123c236528fa46037713cdef00cc11090c121e59eb1d581bd44ebd4e43572d2e2133bbd4a4e282e6237509a7b6f164d5affca044c4cad712aa9e0603c4143bb6bf3b0954bce7ecdfb9cb958e90de9361f45e077dbafe6ddf844e02e4e32be04980e991dc410c4b95e972aba37fbb8795", 0x75}], 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x289}, 0x40000)
write$cgroup_subtree(r3, 0x0, 0x0)
getpid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)='*]nodev\x00'}, 0x30)
mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0)

[  538.928605][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  538.935079][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:01 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:01 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000))
ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0)
ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140))
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)

[  539.818657][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  539.824512][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  540.208673][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  540.214565][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  540.368687][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  540.374502][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  543.968660][    C0] net_ratelimit: 14 callbacks suppressed
[  543.968667][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  543.980220][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  544.368720][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  544.374608][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  544.528726][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  544.534759][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  544.928670][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  544.934604][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  545.168666][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  545.177353][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  549.088606][    C0] net_ratelimit: 16 callbacks suppressed
[  549.088612][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  549.100107][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  549.328636][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  549.334473][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  550.218652][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  550.224485][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:12 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b0", 0x4)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)=[@iv={0x80, 0x117, 0x2, 0x69, "b31f79b4f463433515bc0e24291ad057eecc7c287bf38c5f8864765573715b2fe83c119b1e54f644f7f4d2507156be6393361fb7bcc2b193def3cf5073240520119c97b7e868e4c9a51a9434f7ea4e1bcc0e70f0651e41ff20aebbe5419ac9b3fc6cbd924cf50c61cd"}], 0x80}], 0x1, 0x0)
recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x28a, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x500, 0x0, 0x0)

19:59:12 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x20000, 0x0)

19:59:12 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0)
r1 = socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fff}, 0x0, 0x0, r0, 0x0)
r2 = socket$kcm(0x11, 0x8000000000000003, 0x0)
recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000b40)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000000840)=""/84, 0x54}, 0x40001001)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="00243c9a51fed3dd251b90b5d2ba502bc1565200d9f900000000000000001fd402a17b42904afff000000000000000000000000000daaec783de4c3c820c8f0f74375eb25002043f2f33d8965abebae6cb8934d7337452ec2f0cfe0e001f5dc1da16b0de3a839f65b5d5eae09ceb4117f200000000003500000000000000000000000000000060823c8363be66d12bf265b2d9e1847df17a8ab5f5e60c412f30bdfd4de2ec99d9d302c7a2f3fc78ca52d4f4e32229d5b0d4b37920b0de22af5dd63d99892188f9cc0c7dc8b3d7c05582d493d1439598c29223b9e6a3485ac5b9b73cbeb267d9a01af1600fe156c15f1cbc24589be2683e56fe83dfc67ab2da21d6d099c66d6c066f69d5d02168a088319f9751adaa4fd2845c4a2ddbe1a443dc6acb"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x800004}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x4}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000240)}, {&(0x7f0000000280)="783271530de9c90ade7a4eae572e518a81ac6aea9bb683c8", 0x18}, {&(0x7f00000004c0)="a4e26b358e123c236528fa46037713cdef00cc11090c121e59eb1d581bd44ebd4e43572d2e2133bbd4a4e282e6237509a7b6f164d5affca044c4cad712aa9e0603c4143bb6bf3b0954bce7ecdfb9cb958e90de9361f45e077dbafe6ddf844e02e4e32be04980e991dc410c4b95e972aba37fbb8795", 0x75}], 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x289}, 0x40000)
write$cgroup_subtree(r3, 0x0, 0x0)
getpid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)='*]nodev\x00'}, 0x30)
mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0)

19:59:12 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:12 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000))
ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0)
ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140))
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)

19:59:12 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:59:12 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, 0x0, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:12 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
shmget(0x1, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil)
shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000340)=""/149)
semtimedop(0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x1c9c380})
socket$key(0xf, 0x3, 0x2)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28)
r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x1, 0x8000)
ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000180)={0x5, 0x1})
sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b)

19:59:12 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x24, 0x0, 0x0, 0xff000000}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0xfff, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)

19:59:12 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x21}, 0x4}, 0x1c)
setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000280)=0xff, 0x4)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000002, 0x4000000032, 0xffffffffffffffff, 0x0)
sendmmsg(r1, &(0x7f0000000000), 0x24a, 0x0)

[  550.608622][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  550.614482][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:12 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  550.768692][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  550.774587][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  554.368694][    C0] net_ratelimit: 14 callbacks suppressed
[  554.368701][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  554.380192][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  554.768670][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  554.774997][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  554.928715][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  554.938802][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  555.328676][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  555.334482][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  555.568676][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  555.574509][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  559.488638][    C0] net_ratelimit: 16 callbacks suppressed
[  559.488645][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  559.500239][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:21 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b0", 0x4)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)=[@iv={0x80, 0x117, 0x2, 0x69, "b31f79b4f463433515bc0e24291ad057eecc7c287bf38c5f8864765573715b2fe83c119b1e54f644f7f4d2507156be6393361fb7bcc2b193def3cf5073240520119c97b7e868e4c9a51a9434f7ea4e1bcc0e70f0651e41ff20aebbe5419ac9b3fc6cbd924cf50c61cd"}], 0x80}], 0x1, 0x0)
recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x28a, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x500, 0x0, 0x0)

19:59:21 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x70d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xffffffff}]}}}]}, 0x3c}}, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000080)={0x7, 0x2, 0x4, 0x40006000, 0x3, {}, {0x1, 0x0, 0x2, 0x4f, 0x80, 0x9, "8c80171c"}, 0xfffffa45, 0x3, @offset=0x100, 0x4, 0x0, <r3=>r2})
ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000100))

19:59:21 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:21 executing program 2:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000140)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@sb={'sb', 0x3d, 0x80000000}}]})

19:59:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
shmget(0x1, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil)
shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000340)=""/149)
semtimedop(0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x1c9c380})
socket$key(0xf, 0x3, 0x2)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28)
r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x1, 0x8000)
ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000180)={0x5, 0x1})
sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b)

19:59:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  559.729300][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  559.736533][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:21 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0)

19:59:22 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  559.839336][T11633] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551615)
[  559.996727][T11626] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
19:59:22 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0)

19:59:22 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x9)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$netlink(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf6fa0671940849062b1de3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef245758dec41dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710"], 0x48}}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRESDEC=0x0, @ANYBLOB="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"], 0x3}}, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_BROADCAST={0xc, 0x2, @local}]}, 0xfdbf}}, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_tcp_int(r7, 0x6, 0x24, &(0x7f00000000c0)=0x6, 0x4)
write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f0000000440)={0x0, 0x6, 0x4, 0x100, 0x5, {0x77359400}, {0x2, 0x2, 0x3f, 0x8, 0x3, 0xc6, "8d782624"}, 0x9, 0x1, @offset=0xf5, 0x2, 0x0, <r9=>r8})
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x2400, 0x1)

19:59:22 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:59:22 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x99, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
pipe(&(0x7f0000000140))
bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r0, 0x5)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
r2 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x9c)
r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20\x00', 0x1000, 0x0)
setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000100))
ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, 0x0)
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x54)
syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0)

[  560.275995][T11657] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
[  560.431121][T11662] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
[  560.608608][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  560.615185][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  561.008653][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  561.014769][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  561.168666][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  561.174464][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  564.768689][    C0] net_ratelimit: 14 callbacks suppressed
[  564.774419][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  564.780198][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  565.168693][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  565.175414][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  565.328665][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  565.334795][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  565.728671][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  565.734524][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  565.968656][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  565.974540][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  569.888676][    C0] net_ratelimit: 16 callbacks suppressed
[  569.888685][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  569.900651][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  570.128653][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  570.135317][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  571.008610][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  571.014419][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:33 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b0", 0x4)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000000)=[@iv={0x80, 0x117, 0x2, 0x69, "b31f79b4f463433515bc0e24291ad057eecc7c287bf38c5f8864765573715b2fe83c119b1e54f644f7f4d2507156be6393361fb7bcc2b193def3cf5073240520119c97b7e868e4c9a51a9434f7ea4e1bcc0e70f0651e41ff20aebbe5419ac9b3fc6cbd924cf50c61cd"}], 0x80}], 0x1, 0x0)
recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x28a, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x500, 0x0, 0x0)

19:59:33 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0)

19:59:33 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:59:33 executing program 4:
inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000094)
perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xf48880d859bfc531)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4)
capset(0x0, &(0x7f0000000480)={0x0, 0x0, 0x2, 0x0, 0x8, 0x4})
bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0), 0x19b3aef86ca2203c)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000f364e1747b4355b4600038100000215619545706000000000000000000000000b3b0adf90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7cd8e55d893a85c8f61c64fe32de1bff6f5780931c4df8a3919adba121523451fdde9fa389a4155a2c2eaa5951ffda1a3271191f45a3d6ad01b91f8c488d9cfd17e7ff32c408b40edf6e23dd3e19c372884e1103c413feba015e6fcf0f21bd948eb5a047d1ddc9752950a21cadd"], 0xfdb4)

19:59:33 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
pipe(0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x20000000)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10)
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0x10)
r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x400, 0x0)
ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f00000001c0)={0x6, &(0x7f00000000c0)="51a225d8662d"})
creat(0x0, 0x0)
setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0)

19:59:33 executing program 2:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = dup(r0)
ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x1})
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000000)={0x10001, 0x1, 0x4, 0x40, 0x5, {0x0, 0x7530}, {0xd, 0x4, 0x2, 0x40, 0x5, 0x81, "7318f324"}, 0x0, 0x4, @offset=0x7, 0x1, 0x0, <r4=>r3})
ioctl$SOUND_PCM_READ_CHANNELS(r4, 0x80045006, &(0x7f0000000080))
ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x700})

[  571.408602][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  571.414428][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:33 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, 0x0, 0x0, 0x0)

19:59:33 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet6(r0, &(0x7f0000006700)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000400)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000002900f8ff3900"/24], 0x18}}], 0x2, 0x0)

19:59:33 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  571.568610][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  571.574718][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:33 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, 0x0, 0x0, 0x0)

19:59:34 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, 0x0, 0x0, 0x0)

19:59:34 executing program 0:
r0 = creat(&(0x7f0000000080)='./bus\x00', 0x10)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)=0x1)
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14)

[  575.168677][    C0] net_ratelimit: 14 callbacks suppressed
[  575.174564][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  575.181468][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  575.568703][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  575.574763][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  575.728677][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  575.734492][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  576.128663][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  576.134450][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  576.368666][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  576.374459][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  580.288641][    C0] net_ratelimit: 16 callbacks suppressed
[  580.288650][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  580.300931][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  580.528703][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  580.534641][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  581.408633][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  581.414694][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  581.808703][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  581.814961][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  581.968640][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  581.974468][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:44 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuacct.stat\x00', 0x0, 0x0)
ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1})
write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000540)={0x0, &(0x7f0000000500)}, 0x8)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil})
sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000004}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x30, 0x0, 0x30c, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x10)
syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x0, 0x103800)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_NMI(r3, 0xae9a)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = socket$inet6(0xa, 0x2, 0x0)
r6 = fcntl$dupfd(r4, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380))
ioctl$KVM_RUN(r3, 0xae80, 0x0)

19:59:44 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/d\xff\x00\x00\x05\x00', 0x5, 0x883e091e1bc4c77c)
connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10)
r2 = socket(0x11, 0x80000, 0x0)
write(r2, &(0x7f00000000c0)="24000000200099f0003be97600f1190e020008160000100400ba1000080002007f196be0", 0xffffffe8)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0))
r3 = msgget$private(0x0, 0x0)
msgsnd(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="03000002"], 0x1, 0x0)
msgrcv(r3, &(0x7f0000000300)={0x0, ""/210}, 0xda, 0x0, 0x0)
msgctl$MSG_STAT(r3, 0xb, &(0x7f00000002c0)=""/51)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000180)=0xffffffffffffff1f)
openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x202000, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600)
clock_gettime(0x0, &(0x7f0000000140)={<r6=>0x0, <r7=>0x0})
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f00000001c0)={0x5, 0x4, 0x4, 0x10, 0x5db, {r6, r7/1000+30000}, {0x1, 0x0, 0x22, 0x0, 0x1, 0x0, "cd1ae3be"}, 0x7f, 0x4, @offset=0x2, 0x0, 0x0, <r9=>r8})
connect$unix(r9, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e)
r10 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040), 0x4)

19:59:44 executing program 3 (fault-call:2 fault-nth:0):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe)
write$tun(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x7e)
keyctl$get_persistent(0x16, 0x0, r0)
syz_mount_image$erofs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0)

19:59:44 executing program 0:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
socket$packet(0x11, 0x3, 0x300)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600)
write$fb(r6, &(0x7f00000001c0)="d7b2f23ecdb3bc9bf83bc66409942629797c4894cfe2868c0f3e151ff5027f526b3304425ba397ea99ea0cd1dcf5d692da644eb76c8922ffc11032ee617973647e2743cd447b81efa66b127e5d83688855d2484714e8e92417b0cc9bc631e0e23fe849c995ce1a72ec491d3404caa8419f9512f92b166f9a13ae3dd1abda567867b741a39ff007973a689f140564d8e5b12a4c92a64f14ff68b7b6e8a0c302b83a58eb8357e6a7690659eaa8d3a3642d7874722d40807d9646aa025125ff9ddeabdcfcbd4ea1d34035809930df5d0db65d030c70963b8725b1427397f5c1ad5588e21f49a07c78cf0f434179", 0xec)
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:59:44 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  582.866834][T11742] FAULT_INJECTION: forcing a failure.
[  582.866834][T11742] name failslab, interval 1, probability 0, space 0, times 1
[  582.891922][T11742] CPU: 0 PID: 11742 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  582.902125][T11742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  582.912216][T11742] Call Trace:
[  582.912241][T11742]  dump_stack+0x197/0x210
[  582.912356][T11742]  should_fail.cold+0xa/0x10
[  582.912380][T11742]  ? setup_fault_attr+0x220/0x220
[  582.912418][T11742]  ? ___might_sleep+0x163/0x2c0
[  582.920247][T11742]  __should_failslab+0x121/0x190
[  582.920351][T11742]  should_failslab+0x9/0x14
[  582.920374][T11742]  kmem_cache_alloc_node+0x268/0x740
[  582.949702][T11742]  ? __kasan_check_read+0x11/0x20
[  582.954757][T11742]  ? mark_lock+0xc2/0x1220
[  582.954780][T11742]  __alloc_skb+0xd5/0x5e0
[  582.954801][T11742]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  582.954818][T11742]  ? __kasan_check_read+0x11/0x20
[  582.954843][T11742]  alloc_skb_with_frags+0x93/0x590
[  582.954857][T11742]  ? find_held_lock+0x35/0x130
[  582.954882][T11742]  sock_alloc_send_pskb+0x7ad/0x920
[  582.970956][T11742]  ? sock_wmalloc+0x120/0x120
[  582.970976][T11742]  ? __kasan_check_read+0x11/0x20
[  582.971051][T11742]  ? ip6_mtu+0x2e6/0x450
[  582.971068][T11742]  ? find_held_lock+0x35/0x130
19:59:45 executing program 2:
r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0xfff, 0x4)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setreuid(0x0, r2)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7000000000000000c00000000000000bca0000000000000b800000000000000"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffbb}, 0x48)

19:59:45 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
socket$vsock_stream(0x28, 0x1, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  582.971092][T11742]  sock_alloc_send_skb+0x32/0x40
[  582.971139][T11742]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  583.026063][T11742]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.031253][T11742]  ? ip6_setup_cork+0x1920/0x1920
[  583.037188][T11742]  ? ip6_flush_pending_frames+0xd0/0xd0
[  583.043377][T11742]  ? __kasan_check_read+0x11/0x20
[  583.048443][T11742]  ip6_make_skb+0x32f/0x570
[  583.053067][T11742]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.058254][T11742]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.063317][T11742]  ? ip6_push_pending_frames+0xf0/0xf0
[  583.068813][T11742]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  583.074534][T11742]  ? ip6_forward_finish+0x570/0x570
[  583.079845][T11742]  ? rcu_read_lock_held+0x9c/0xb0
[  583.084986][T11742]  udpv6_sendmsg+0x22a1/0x2b30
[  583.089797][T11742]  ? __kasan_check_write+0x14/0x20
[  583.094965][T11742]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.100200][T11742]  ? udp_v6_get_port+0x6b0/0x6b0
[  583.105132][T11742]  ? __kasan_check_read+0x11/0x20
[  583.110289][T11742]  ? mark_lock+0xc2/0x1220
[  583.115070][T11742]  ? __kasan_check_read+0x11/0x20
[  583.120097][T11742]  ? mark_lock+0xc2/0x1220
[  583.124627][T11742]  ? __kasan_check_read+0x11/0x20
[  583.129660][T11742]  ? ___might_sleep+0x163/0x2c0
[  583.134530][T11742]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  583.140220][T11742]  ? aa_sk_perm+0x346/0xb00
[  583.144950][T11742]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  583.150552][T11742]  inet6_sendmsg+0x9e/0xe0
[  583.154965][T11742]  ? inet6_sendmsg+0x9e/0xe0
[  583.159571][T11742]  ? inet6_ioctl+0x1c0/0x1c0
[  583.164193][T11742]  sock_sendmsg+0xd7/0x130
[  583.168602][T11742]  ____sys_sendmsg+0x358/0x880
[  583.173502][T11742]  ? kernel_sendmsg+0x50/0x50
[  583.178178][T11742]  ? __fget+0x35d/0x550
[  583.182340][T11742]  ? find_held_lock+0x35/0x130
[  583.187126][T11742]  ___sys_sendmsg+0x100/0x170
[  583.192422][T11742]  ? sendmsg_copy_msghdr+0x70/0x70
[  583.197763][T11742]  ? __kasan_check_read+0x11/0x20
[  583.202804][T11742]  ? __fget+0x37f/0x550
[  583.206972][T11742]  ? do_dup2+0x4f0/0x4f0
[  583.211204][T11742]  ? find_held_lock+0x35/0x130
[  583.216166][T11742]  ? get_pid_task+0x11d/0x210
[  583.220879][T11742]  ? __fget_light+0x1a9/0x230
[  583.225581][T11742]  ? __fdget+0x1b/0x20
[  583.229741][T11742]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  583.238051][T11742]  ? sockfd_lookup_light+0xcb/0x180
[  583.243516][T11742]  __sys_sendmmsg+0x1bf/0x4d0
[  583.248521][T11742]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  583.253573][T11742]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  583.260654][T11742]  ? fput_many+0x12c/0x1a0
[  583.265297][T11742]  ? fput+0x1b/0x20
[  583.269121][T11742]  ? ksys_write+0x1cf/0x290
[  583.274002][T11742]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  583.279553][T11742]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  583.285002][T11742]  ? do_syscall_64+0x26/0x790
[  583.289746][T11742]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  583.295931][T11742]  ? do_syscall_64+0x26/0x790
[  583.301072][T11742]  __x64_sys_sendmmsg+0x9d/0x100
[  583.306221][T11742]  do_syscall_64+0xfa/0x790
[  583.310751][T11742]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  583.317236][T11742] RIP: 0033:0x45a919
[  583.321169][T11742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  583.340946][T11742] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  583.350355][T11742] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  583.358527][T11742] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
19:59:45 executing program 3 (fault-call:2 fault-nth:1):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  583.366597][T11742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  583.374648][T11742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  583.382612][T11742] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  583.532080][T11759] FAULT_INJECTION: forcing a failure.
[  583.532080][T11759] name failslab, interval 1, probability 0, space 0, times 0
19:59:45 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x81, 0x7, 0x5, 0x1}, 0x14a)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0)
ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000040)={0x7b, 0x13747608, 0x80000000, 0xe1, 0x3, @stepwise={{0x2, 0x672}, {0x7, 0x7}, {0xe389, 0x2}}})
r2 = fcntl$dupfd(r0, 0x0, r0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000240), 0x0}, 0x20)

[  583.630909][T11759] CPU: 1 PID: 11759 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  583.640857][T11759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  583.650927][T11759] Call Trace:
[  583.654238][T11759]  dump_stack+0x197/0x210
[  583.658597][T11759]  should_fail.cold+0xa/0x10
[  583.663249][T11759]  ? setup_fault_attr+0x220/0x220
[  583.668337][T11759]  ? ___might_sleep+0x163/0x2c0
[  583.673219][T11759]  __should_failslab+0x121/0x190
[  583.678194][T11759]  should_failslab+0x9/0x14
[  583.682845][T11759]  kmem_cache_alloc_node_trace+0x274/0x750
[  583.688682][T11759]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  583.694693][T11759]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  583.700536][T11759]  __kmalloc_node_track_caller+0x3d/0x70
[  583.706311][T11759]  __kmalloc_reserve.isra.0+0x40/0xf0
[  583.711711][T11759]  __alloc_skb+0x10b/0x5e0
[  583.716153][T11759]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  583.722166][T11759]  alloc_skb_with_frags+0x93/0x590
[  583.727409][T11759]  ? is_bpf_text_address+0xac/0x160
[  583.732641][T11759]  sock_alloc_send_pskb+0x7ad/0x920
[  583.737902][T11759]  ? sock_wmalloc+0x120/0x120
[  583.742610][T11759]  ? __kasan_check_read+0x11/0x20
[  583.747758][T11759]  ? ip6_mtu+0x2e6/0x450
[  583.752013][T11759]  ? find_held_lock+0x35/0x130
[  583.757056][T11759]  sock_alloc_send_skb+0x32/0x40
[  583.762020][T11759]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  583.767762][T11759]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.772902][T11759]  ? ip6_setup_cork+0x1920/0x1920
[  583.778045][T11759]  ? ip6_flush_pending_frames+0xd0/0xd0
[  583.783619][T11759]  ? __kasan_check_read+0x11/0x20
[  583.788899][T11759]  ip6_make_skb+0x32f/0x570
[  583.793693][T11759]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.798738][T11759]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.803785][T11759]  ? ip6_push_pending_frames+0xf0/0xf0
[  583.809279][T11759]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  583.814845][T11759]  ? ip6_forward_finish+0x570/0x570
[  583.820083][T11759]  ? rcu_read_lock_held+0x9c/0xb0
[  583.825159][T11759]  udpv6_sendmsg+0x22a1/0x2b30
[  583.829952][T11759]  ? __kasan_check_write+0x14/0x20
[  583.835087][T11759]  ? ip_reply_glue_bits+0xc0/0xc0
[  583.840149][T11759]  ? udp_v6_get_port+0x6b0/0x6b0
[  583.845193][T11759]  ? __kasan_check_read+0x11/0x20
[  583.850498][T11759]  ? mark_lock+0xc2/0x1220
[  583.854939][T11759]  ? __kasan_check_read+0x11/0x20
[  583.859983][T11759]  ? mark_lock+0xc2/0x1220
[  583.864419][T11759]  ? __kasan_check_read+0x11/0x20
[  583.869470][T11759]  ? ___might_sleep+0x163/0x2c0
[  583.874351][T11759]  ? debug_lockdep_rcu_enabled+0x71/0xa0
19:59:46 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f00000002c0))
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000000c0))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0x8, &(0x7f0000000000)='GPLeth0\x00'}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc)
lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
fcntl$setstatus(r2, 0x4, 0x40000)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x779c7c060c487abd, 0x0)
setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8)
openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xe040, 0x0)
connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="02f9cc000000794d9c68329d6965330acaa8f3"], 0x2de)

19:59:46 executing program 4:
r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvme-fabrics\x00', 0x84000, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffbfff, r0, 0x0)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0)
write$binfmt_script(0xffffffffffffffff, 0x0, 0x0)
r2 = getpid()
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000180))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0xb, &(0x7f0000000040)='lo{keyring\x00', <r4=>0xffffffffffffffff}, 0x30)
ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000240)={0x0, 0x4d, 0xded, <r5=>0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0x200, [], @p_u8=&(0x7f00000001c0)}})
setsockopt$SO_J1939_PROMISC(r5, 0x6b, 0x2, &(0x7f0000000280)=0x1, 0x4)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='\xf6]nodev\x00', r4}, 0x30)
unshare(0x4000400)

[  583.880009][T11759]  ? aa_sk_perm+0x346/0xb00
[  583.884552][T11759]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  583.890740][T11759]  inet6_sendmsg+0x9e/0xe0
[  583.895176][T11759]  ? inet6_sendmsg+0x9e/0xe0
[  583.899800][T11759]  ? inet6_ioctl+0x1c0/0x1c0
[  583.904520][T11759]  sock_sendmsg+0xd7/0x130
[  583.908972][T11759]  ____sys_sendmsg+0x358/0x880
[  583.913785][T11759]  ? kernel_sendmsg+0x50/0x50
[  583.918491][T11759]  ? __fget+0x35d/0x550
[  583.922703][T11759]  ? find_held_lock+0x35/0x130
[  583.927503][T11759]  ___sys_sendmsg+0x100/0x170
[  583.932236][T11759]  ? sendmsg_copy_msghdr+0x70/0x70
[  583.937369][T11759]  ? __kasan_check_read+0x11/0x20
[  583.942433][T11759]  ? __fget+0x37f/0x550
[  583.946629][T11759]  ? do_dup2+0x4f0/0x4f0
[  583.950920][T11759]  ? find_held_lock+0x35/0x130
[  583.955712][T11759]  ? get_pid_task+0x11d/0x210
[  583.960412][T11759]  ? __fget_light+0x1a9/0x230
[  583.965111][T11759]  ? __fdget+0x1b/0x20
[  583.969205][T11759]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  583.975476][T11759]  ? sockfd_lookup_light+0xcb/0x180
[  583.980720][T11759]  __sys_sendmmsg+0x1bf/0x4d0
[  583.985431][T11759]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  583.990526][T11759]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  583.996792][T11759]  ? fput_many+0x12c/0x1a0
[  584.001243][T11759]  ? fput+0x1b/0x20
[  584.005090][T11759]  ? ksys_write+0x1cf/0x290
[  584.009624][T11759]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  584.015107][T11759]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  584.020599][T11759]  ? do_syscall_64+0x26/0x790
[  584.025328][T11759]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  584.031510][T11759]  ? do_syscall_64+0x26/0x790
[  584.036239][T11759]  __x64_sys_sendmmsg+0x9d/0x100
[  584.041214][T11759]  do_syscall_64+0xfa/0x790
[  584.045785][T11759]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  584.051697][T11759] RIP: 0033:0x45a919
[  584.055618][T11759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  584.075588][T11759] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  584.084711][T11759] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  584.092703][T11759] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  584.100746][T11759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  584.108747][T11759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  584.116742][T11759] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  585.568629][    C0] net_ratelimit: 14 callbacks suppressed
[  585.568635][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  585.580096][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  585.978652][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  585.984503][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  586.128636][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  586.134477][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  586.528747][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  586.534956][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  586.768677][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  586.774527][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  590.688742][    C0] net_ratelimit: 16 callbacks suppressed
[  590.694472][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  590.700295][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  590.928669][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  590.934666][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  591.808628][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  591.814550][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  592.208607][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  592.214459][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  592.368640][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  592.374453][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:59:56 executing program 5:
setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0)
openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0)
r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=',]%/\x00', 0xffffffffffffffff)
keyctl$get_persistent(0x16, 0xee01, r1)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x3)
close(r0)
r3 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="123b9c6f06d12674fe0c81b214d217aa5263914efcfe5bb872e69b86a02aab110afda8862a983a48087f164fc57760cff13f392271e52c8bda18c4e1276cfe14a1eed9a11ee34695dbeb1e76daaa545bc6aa53699007fb24b0037a77eaf1ee07b16aa54a13f7fe6880ee1f51d99f3e20a5fd5f6836ddf4f87f373a1a0ec126172aa64bf25cfa17f7b6728c1ca78d66263a825b0893b4388c3f20d1692cfae098c2d44e9fb8dcc548b0e04a8bd6ed7c59fe4a", @ANYRES32=<r4=>0x0], &(0x7f0000000180)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, r4}, &(0x7f00000001c0)=0x10)

19:59:56 executing program 4:
getpid()
timer_create(0x0, &(0x7f0000000100), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
keyctl$revoke(0x15, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=<r0=>0x0)
r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6(0xa, 0x3, 0xa)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20)
r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0)
preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}], 0x4, 0x0)
r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/udplite\x00')
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
openat$cgroup_type(r4, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080))
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x19681}, 0x0, 0x0, r5, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x9, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000)
ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000240)=0x1)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8)
request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200))
add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb)

19:59:56 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
r3 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r4=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r4}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000280)={<r5=>r4, @in6={{0xa, 0x4e22, 0x4, @loopback, 0x4}}, [0x2, 0x8000, 0x800, 0x106, 0x20, 0x0, 0x9, 0x418, 0x2, 0x9d, 0x9, 0x1, 0x400, 0x240, 0xfffffffffffffffb]}, &(0x7f0000000100)=0x100)
getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r5, 0x80, 0x4e, 0x3}, &(0x7f0000000380)=0x10)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x26}, 0xd8)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080))
ioctl$SNDRV_TIMER_IOCTL_STATUS64(r6, 0x80605414, &(0x7f0000000000))
sendto$inet6(r0, &(0x7f0000f6f000), 0xffffffae, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)

19:59:56 executing program 3 (fault-call:2 fault-nth:2):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:59:56 executing program 2:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
chdir(&(0x7f00000002c0)='./bus\x00')
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0)
write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x4)

19:59:56 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  594.493075][T11804] FAULT_INJECTION: forcing a failure.
[  594.493075][T11804] name failslab, interval 1, probability 0, space 0, times 0
[  594.554367][T11804] CPU: 1 PID: 11804 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  594.564303][T11804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  594.574371][T11804] Call Trace:
[  594.577680][T11804]  dump_stack+0x197/0x210
[  594.582042][T11804]  should_fail.cold+0xa/0x10
[  594.586683][T11804]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  594.592521][T11804]  ? setup_fault_attr+0x220/0x220
[  594.597569][T11804]  ? find_held_lock+0x35/0x130
[  594.602421][T11804]  ? __nf_conntrack_find_get+0xa6e/0x13b0
[  594.608270][T11804]  __should_failslab+0x121/0x190
[  594.613321][T11804]  should_failslab+0x9/0x14
[  594.617840][T11804]  kmem_cache_alloc+0x47/0x710
[  594.622653][T11804]  ? __nf_conntrack_find_get+0xb2e/0x13b0
[  594.628392][T11804]  ? __kasan_check_read+0x11/0x20
[  594.633439][T11804]  __nf_conntrack_alloc+0xdb/0x6c0
[  594.638586][T11804]  init_conntrack.isra.0+0xe3c/0x11a0
[  594.643993][T11804]  ? nf_conntrack_alloc+0x50/0x50
[  594.649105][T11804]  ? ip6t_do_table+0xdd5/0x1cc0
19:59:56 executing program 0:
syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={[{@umask={'umask'}}]})
r0 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r0, 0x4, 0xffffffffffffffff, 0x8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={<r1=>0x0}, &(0x7f0000000040)=0xc)
rt_tgsigqueueinfo(r0, r1, 0x12, &(0x7f0000000080)={0xb, 0x7ff, 0x8001})

[  594.653979][T11804]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  594.660247][T11804]  nf_conntrack_in+0xd94/0x1460
[  594.665131][T11804]  ? nf_conntrack_update+0x960/0x960
[  594.670545][T11804]  ? ip6t_error+0x40/0x40
[  594.674908][T11804]  ipv6_conntrack_local+0x1e/0x30
[  594.680048][T11804]  nf_hook_slow+0xbc/0x1e0
[  594.684546][T11804]  __ip6_local_out+0x45e/0x8e0
[  594.689333][T11804]  ? dst_output+0x170/0x170
[  594.693864][T11804]  ? ip6_dst_hoplimit+0x3e0/0x3e0
[  594.698899][T11804]  ? ip6_make_skb+0x370/0x570
[  594.703729][T11804]  ? ip_reply_glue_bits+0xc0/0xc0
[  594.708778][T11804]  ip6_local_out+0x2d/0x1b0
[  594.713423][T11804]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  594.719706][T11804]  ip6_send_skb+0xbb/0x350
[  594.724150][T11804]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  594.729631][T11804]  ? ip6_forward_finish+0x570/0x570
[  594.734879][T11804]  udpv6_sendmsg+0x22f3/0x2b30
[  594.739657][T11804]  ? __kasan_check_write+0x14/0x20
[  594.744783][T11804]  ? ip_reply_glue_bits+0xc0/0xc0
[  594.749839][T11804]  ? udp_v6_get_port+0x6b0/0x6b0
[  594.754794][T11804]  ? __kasan_check_read+0x11/0x20
[  594.759835][T11804]  ? mark_lock+0xc2/0x1220
[  594.764277][T11804]  ? __kasan_check_read+0x11/0x20
[  594.769315][T11804]  ? mark_lock+0xc2/0x1220
[  594.773746][T11804]  ? __kasan_check_read+0x11/0x20
[  594.778798][T11804]  ? ___might_sleep+0x163/0x2c0
[  594.783937][T11804]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  594.789598][T11804]  ? aa_sk_perm+0x346/0xb00
[  594.794143][T11804]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  594.799718][T11804]  inet6_sendmsg+0x9e/0xe0
[  594.804154][T11804]  ? inet6_sendmsg+0x9e/0xe0
[  594.808760][T11804]  ? inet6_ioctl+0x1c0/0x1c0
[  594.813362][T11804]  sock_sendmsg+0xd7/0x130
[  594.817804][T11804]  ____sys_sendmsg+0x358/0x880
[  594.822683][T11804]  ? kernel_sendmsg+0x50/0x50
[  594.827375][T11804]  ? __fget+0x35d/0x550
[  594.831544][T11804]  ? find_held_lock+0x35/0x130
[  594.836334][T11804]  ___sys_sendmsg+0x100/0x170
[  594.841024][T11804]  ? sendmsg_copy_msghdr+0x70/0x70
[  594.846153][T11804]  ? __kasan_check_read+0x11/0x20
[  594.851286][T11804]  ? __fget+0x37f/0x550
19:59:56 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'hsr0\x00'})
perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x15)
io_setup(0xc, 0x0)
r1 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40002, 0x0)
close(r1)
io_submit(0x0, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
clock_gettime(0x0, &(0x7f0000000040))
clock_settime(0x0, &(0x7f00000000c0))
socket$inet_sctp(0x2, 0x5, 0x84)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x800000, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x0, 0x1, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00L\x00H\x00\x00\x00\x00\x00\x00\xff\x00', 0x1})

[  594.855451][T11804]  ? do_dup2+0x4f0/0x4f0
[  594.859701][T11804]  ? find_held_lock+0x35/0x130
[  594.864474][T11804]  ? get_pid_task+0x11d/0x210
[  594.869203][T11804]  ? __fget_light+0x1a9/0x230
[  594.874053][T11804]  ? __fdget+0x1b/0x20
[  594.878146][T11804]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  594.884528][T11804]  ? sockfd_lookup_light+0xcb/0x180
[  594.889947][T11804]  __sys_sendmmsg+0x1bf/0x4d0
[  594.894645][T11804]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  594.899701][T11804]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  594.906210][T11804]  ? fput_many+0x12c/0x1a0
[  594.910639][T11804]  ? fput+0x1b/0x20
[  594.914448][T11804]  ? ksys_write+0x1cf/0x290
[  594.918976][T11804]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  594.924450][T11804]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  594.929908][T11804]  ? do_syscall_64+0x26/0x790
[  594.934601][T11804]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  594.940840][T11804]  ? do_syscall_64+0x26/0x790
[  594.945518][T11804]  __x64_sys_sendmmsg+0x9d/0x100
[  594.950461][T11804]  do_syscall_64+0xfa/0x790
[  594.954964][T11804]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  594.960850][T11804] RIP: 0033:0x45a919
[  594.964825][T11804] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  594.984415][T11804] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  594.992829][T11804] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
19:59:57 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

19:59:57 executing program 3 (fault-call:2 fault-nth:3):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  595.000799][T11804] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  595.008785][T11804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  595.016759][T11804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  595.024720][T11804] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
19:59:57 executing program 2:
r0 = socket(0x10, 0x3, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000000)={0x8})
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', <r3=>0x0})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400070700"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x170}}, 0x0)
sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0)

[  595.203256][T11824] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  595.225646][T11824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  595.226576][T11833] FAULT_INJECTION: forcing a failure.
[  595.226576][T11833] name failslab, interval 1, probability 0, space 0, times 0
[  595.250231][T11833] CPU: 0 PID: 11833 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  595.260147][T11833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  595.270225][T11833] Call Trace:
[  595.273534][T11833]  dump_stack+0x197/0x210
[  595.277993][T11833]  should_fail.cold+0xa/0x10
[  595.283102][T11833]  ? setup_fault_attr+0x220/0x220
[  595.288177][T11833]  ? nf_ct_ext_add+0x26b/0x630
[  595.293067][T11833]  __should_failslab+0x121/0x190
[  595.298044][T11833]  should_failslab+0x9/0x14
[  595.302577][T11833]  __kmalloc_track_caller+0x6d/0x760
[  595.308150][T11833]  ? lock_downgrade+0x920/0x920
[  595.313111][T11833]  ? rcu_read_lock_held+0x9c/0xb0
[  595.318178][T11833]  ? nf_ct_ext_add+0x2c7/0x630
[  595.323144][T11833]  krealloc+0x66/0xd0
[  595.327186][T11833]  nf_ct_ext_add+0x2c7/0x630
[  595.331898][T11833]  init_conntrack.isra.0+0x439/0x11a0
[  595.337462][T11833]  ? nf_conntrack_alloc+0x50/0x50
[  595.342605][T11833]  ? ip6t_do_table+0xdd5/0x1cc0
[  595.347471][T11833]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  595.353750][T11833]  nf_conntrack_in+0xd94/0x1460
[  595.358667][T11833]  ? nf_conntrack_update+0x960/0x960
[  595.363955][T11833]  ? ip6t_error+0x40/0x40
[  595.368283][T11833]  ipv6_conntrack_local+0x1e/0x30
[  595.373314][T11833]  nf_hook_slow+0xbc/0x1e0
[  595.377740][T11833]  __ip6_local_out+0x45e/0x8e0
[  595.382594][T11833]  ? dst_output+0x170/0x170
[  595.387101][T11833]  ? ip6_dst_hoplimit+0x3e0/0x3e0
[  595.392113][T11833]  ? ip6_make_skb+0x370/0x570
[  595.396955][T11833]  ? ip_reply_glue_bits+0xc0/0xc0
[  595.402136][T11833]  ip6_local_out+0x2d/0x1b0
[  595.406661][T11833]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  595.413155][T11833]  ip6_send_skb+0xbb/0x350
[  595.417564][T11833]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  595.423185][T11833]  ? ip6_forward_finish+0x570/0x570
[  595.428640][T11833]  udpv6_sendmsg+0x22f3/0x2b30
[  595.433394][T11833]  ? __kasan_check_write+0x14/0x20
[  595.438495][T11833]  ? ip_reply_glue_bits+0xc0/0xc0
[  595.443517][T11833]  ? udp_v6_get_port+0x6b0/0x6b0
[  595.448465][T11833]  ? __kasan_check_read+0x11/0x20
[  595.453487][T11833]  ? mark_lock+0xc2/0x1220
[  595.458006][T11833]  ? __kasan_check_read+0x11/0x20
[  595.463239][T11833]  ? mark_lock+0xc2/0x1220
[  595.467660][T11833]  ? __kasan_check_read+0x11/0x20
[  595.472869][T11833]  ? ___might_sleep+0x163/0x2c0
[  595.477734][T11833]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  595.483371][T11833]  ? aa_sk_perm+0x346/0xb00
[  595.487873][T11833]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  595.493433][T11833]  inet6_sendmsg+0x9e/0xe0
[  595.497940][T11833]  ? inet6_sendmsg+0x9e/0xe0
[  595.502816][T11833]  ? inet6_ioctl+0x1c0/0x1c0
[  595.507512][T11833]  sock_sendmsg+0xd7/0x130
[  595.512113][T11833]  ____sys_sendmsg+0x358/0x880
[  595.517060][T11833]  ? kernel_sendmsg+0x50/0x50
[  595.521964][T11833]  ? __fget+0x35d/0x550
[  595.526864][T11833]  ? find_held_lock+0x35/0x130
[  595.533551][T11833]  ___sys_sendmsg+0x100/0x170
[  595.539074][T11833]  ? sendmsg_copy_msghdr+0x70/0x70
[  595.544184][T11833]  ? __kasan_check_read+0x11/0x20
[  595.549292][T11833]  ? __fget+0x37f/0x550
[  595.553456][T11833]  ? do_dup2+0x4f0/0x4f0
[  595.557696][T11833]  ? find_held_lock+0x35/0x130
[  595.562585][T11833]  ? get_pid_task+0x11d/0x210
[  595.567638][T11833]  ? __fget_light+0x1a9/0x230
[  595.572460][T11833]  ? __fdget+0x1b/0x20
[  595.576526][T11833]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  595.582771][T11833]  ? sockfd_lookup_light+0xcb/0x180
[  595.588240][T11833]  __sys_sendmmsg+0x1bf/0x4d0
[  595.592911][T11833]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  595.599995][T11833]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  595.606372][T11833]  ? fput_many+0x12c/0x1a0
[  595.611531][T11833]  ? fput+0x1b/0x20
[  595.615428][T11833]  ? ksys_write+0x1cf/0x290
[  595.620025][T11833]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  595.625495][T11833]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  595.631076][T11833]  ? do_syscall_64+0x26/0x790
[  595.635860][T11833]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  595.641951][T11833]  ? do_syscall_64+0x26/0x790
[  595.647005][T11833]  __x64_sys_sendmmsg+0x9d/0x100
[  595.652486][T11833]  do_syscall_64+0xfa/0x790
[  595.657004][T11833]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  595.662895][T11833] RIP: 0033:0x45a919
[  595.666778][T11833] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  595.686640][T11833] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  595.695282][T11833] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  595.703485][T11833] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  595.711562][T11833] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  595.719530][T11833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  595.727512][T11833] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
19:59:57 executing program 3 (fault-call:2 fault-nth:4):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  595.968659][    C0] net_ratelimit: 14 callbacks suppressed
[  595.968667][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  595.980846][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  596.059189][T11850] FAULT_INJECTION: forcing a failure.
[  596.059189][T11850] name failslab, interval 1, probability 0, space 0, times 0
[  596.182551][T11850] CPU: 1 PID: 11850 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  596.192643][T11850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  596.202884][T11850] Call Trace:
[  596.206307][T11850]  dump_stack+0x197/0x210
[  596.210668][T11850]  should_fail.cold+0xa/0x10
[  596.215281][T11850]  ? setup_fault_attr+0x220/0x220
[  596.220338][T11850]  ? nf_ct_ext_add+0x26b/0x630
[  596.225159][T11850]  __should_failslab+0x121/0x190
[  596.230166][T11850]  should_failslab+0x9/0x14
[  596.235227][T11850]  __kmalloc_track_caller+0x6d/0x760
[  596.240558][T11850]  ? lock_downgrade+0x920/0x920
[  596.245441][T11850]  ? rcu_read_lock_held+0x9c/0xb0
[  596.251086][T11850]  ? nf_ct_ext_add+0x2c7/0x630
[  596.256054][T11850]  krealloc+0x66/0xd0
[  596.260069][T11850]  nf_ct_ext_add+0x2c7/0x630
[  596.264811][T11850]  init_conntrack.isra.0+0x439/0x11a0
[  596.270243][T11850]  ? nf_conntrack_alloc+0x50/0x50
[  596.275645][T11850]  ? ip6t_do_table+0xdd5/0x1cc0
[  596.280529][T11850]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  596.287026][T11850]  nf_conntrack_in+0xd94/0x1460
[  596.291924][T11850]  ? nf_conntrack_update+0x960/0x960
[  596.297333][T11850]  ? ip6t_error+0x40/0x40
[  596.301721][T11850]  ipv6_conntrack_local+0x1e/0x30
[  596.306962][T11850]  nf_hook_slow+0xbc/0x1e0
[  596.311405][T11850]  __ip6_local_out+0x45e/0x8e0
[  596.316189][T11850]  ? dst_output+0x170/0x170
[  596.321100][T11850]  ? ip6_dst_hoplimit+0x3e0/0x3e0
[  596.326134][T11850]  ? ip6_make_skb+0x370/0x570
[  596.331187][T11850]  ? ip_reply_glue_bits+0xc0/0xc0
[  596.336293][T11850]  ip6_local_out+0x2d/0x1b0
[  596.340808][T11850]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  596.347111][T11850]  ip6_send_skb+0xbb/0x350
[  596.351545][T11850]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  596.357136][T11850]  ? ip6_forward_finish+0x570/0x570
[  596.362552][T11850]  udpv6_sendmsg+0x22f3/0x2b30
[  596.367628][T11850]  ? __kasan_check_write+0x14/0x20
[  596.368632][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  596.372823][T11850]  ? ip_reply_glue_bits+0xc0/0xc0
[  596.372850][T11850]  ? udp_v6_get_port+0x6b0/0x6b0
[  596.372870][T11850]  ? __kasan_check_read+0x11/0x20
[  596.378910][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  596.383837][T11850]  ? mark_lock+0xc2/0x1220
[  596.404556][T11850]  ? __kasan_check_read+0x11/0x20
[  596.409608][T11850]  ? mark_lock+0xc2/0x1220
[  596.414038][T11850]  ? __kasan_check_read+0x11/0x20
[  596.419078][T11850]  ? ___might_sleep+0x163/0x2c0
[  596.423952][T11850]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  596.429792][T11850]  ? aa_sk_perm+0x346/0xb00
[  596.434417][T11850]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  596.440156][T11850]  inet6_sendmsg+0x9e/0xe0
[  596.444627][T11850]  ? inet6_sendmsg+0x9e/0xe0
[  596.449319][T11850]  ? inet6_ioctl+0x1c0/0x1c0
[  596.454272][T11850]  sock_sendmsg+0xd7/0x130
[  596.458718][T11850]  ____sys_sendmsg+0x358/0x880
[  596.463945][T11850]  ? kernel_sendmsg+0x50/0x50
[  596.468698][T11850]  ? __fget+0x35d/0x550
[  596.472871][T11850]  ? find_held_lock+0x35/0x130
[  596.477648][T11850]  ___sys_sendmsg+0x100/0x170
[  596.482528][T11850]  ? sendmsg_copy_msghdr+0x70/0x70
[  596.488083][T11850]  ? __kasan_check_read+0x11/0x20
[  596.493134][T11850]  ? __fget+0x37f/0x550
[  596.497878][T11850]  ? do_dup2+0x4f0/0x4f0
[  596.502888][T11850]  ? find_held_lock+0x35/0x130
[  596.507946][T11850]  ? get_pid_task+0x11d/0x210
[  596.512852][T11850]  ? __fget_light+0x1a9/0x230
[  596.517537][T11850]  ? __fdget+0x1b/0x20
[  596.522676][T11850]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  596.528664][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  596.528946][T11850]  ? sockfd_lookup_light+0xcb/0x180
[  596.535027][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  596.540351][T11850]  __sys_sendmmsg+0x1bf/0x4d0
[  596.540373][T11850]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  596.540407][T11850]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  596.540429][T11850]  ? fput_many+0x12c/0x1a0
[  596.566752][T11850]  ? fput+0x1b/0x20
[  596.570771][T11850]  ? ksys_write+0x1cf/0x290
[  596.575295][T11850]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  596.580843][T11850]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  596.586531][T11850]  ? do_syscall_64+0x26/0x790
[  596.591269][T11850]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  596.597426][T11850]  ? do_syscall_64+0x26/0x790
[  596.602124][T11850]  __x64_sys_sendmmsg+0x9d/0x100
[  596.607058][T11850]  do_syscall_64+0xfa/0x790
[  596.611677][T11850]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  596.617605][T11850] RIP: 0033:0x45a919
[  596.621504][T11850] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  596.641212][T11850] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  596.649923][T11850] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  596.657990][T11850] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  596.666200][T11850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  596.674203][T11850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  596.682199][T11850] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  596.938751][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  596.944774][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  597.168642][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  597.174485][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  601.088675][    C0] net_ratelimit: 16 callbacks suppressed
[  601.088684][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  601.100441][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  601.328628][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  601.334864][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  602.208656][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  602.208717][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  602.608632][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  602.614490][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  602.768654][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  602.774619][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:06 executing program 5:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080))
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18)
bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r1, 0x0, 0x0}, 0x20)

20:00:06 executing program 0:
r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x2f, 0x7, 0x15, 0x1, 0x0, 0x0, 0x3, 0x72})
r2 = socket(0x10, 0x2, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000080)={{0x7, 0x20, 0x0, 0xa1, 0x39, 0x27}, 0x6})
clone(0x10062101, 0x0, 0x0, 0x0, 0x0)

20:00:06 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x240, 0x0)
ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b8feff0019000100000006005b000000ff01080000ffffffffffffffe2000001e0006bf000000000000000000000000000000000000000000a00002e0000000085d6a3f7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000002000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:06 executing program 4:
openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$key(0xffffffffffffffff, 0x0, 0x0)
r1 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40)
writev(r1, 0x0, 0x0)
ioctl$SG_GET_REQUEST_TABLE(r1, 0x227d, &(0x7f0000000780))
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
close(0xffffffffffffffff)
ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60)
r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
close(0xffffffffffffffff)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
r5 = dup3(r2, r3, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080))
syz_open_dev$mouse(&(0x7f0000000280)='/#\x00', 0xdff, 0x80000)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080))
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000080))
ioctl$RTC_ALM_READ(r8, 0x80247008, &(0x7f0000000300))
pipe(&(0x7f0000000540)={<r9=>0xffffffffffffffff})
dup(r2)
close(r9)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$KVM_SET_GSI_ROUTING(r10, 0x4008ae6a, &(0x7f00000003c0)=ANY=[@ANYBLOB="060000000000000004000000c322a1b2000000000000000000000000060000000400000000080000000000000000000000000000000000001c000000000000000400000000000000040000000000000005000000000100000b0000000000010001800000000100000010000003000000000000000000000003800000090000000800000006000000000000000000000000000000000000000500000002000000000000000000000008000000010000000000000000000000000000000000000000000000000000000100000002000000000000000000000007000000ff0f00000000000000000000000000000000000000000000000000000600000004000000000000000000000007000000001000000800ac1633560000faffffff00"/300])
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x203, 0x0)
dup2(r5, r4)
socket$inet6(0xa, 0x3, 0x6)
syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')

20:00:06 executing program 3 (fault-call:2 fault-nth:5):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:06 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:00:06 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000a00200007001000070010000700100009800000098000000080200000802000008020000080200000802000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000addeb124cc7db95d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b000d80000000000000000000000000000000000000000004000636f6e6e6c696d69740000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000ffffffffe000000100000000000000006c6170623000000000000000000000007465616d30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)
bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c)
syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0)

[  604.012253][T11869] FAULT_INJECTION: forcing a failure.
[  604.012253][T11869] name failslab, interval 1, probability 0, space 0, times 0
[  604.025449][T11869] CPU: 1 PID: 11869 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  604.039794][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  604.049865][T11869] Call Trace:
[  604.053182][T11869]  dump_stack+0x197/0x210
[  604.057537][T11869]  should_fail.cold+0xa/0x10
[  604.066439][T11869]  ? is_bpf_text_address+0xac/0x160
[  604.071682][T11869]  ? setup_fault_attr+0x220/0x220
[  604.076746][T11869]  __should_failslab+0x121/0x190
[  604.081712][T11869]  should_failslab+0x9/0x14
[  604.086580][T11869]  kmem_cache_alloc+0x47/0x710
[  604.091372][T11869]  ? lock_acquire+0x190/0x410
[  604.096142][T11869]  ? net_tx_action+0xd30/0xd30
[  604.104417][T11869]  skb_clone+0x154/0x3d0
[  604.109630][T11869]  dev_queue_xmit_nit+0x3a1/0xaa0
[  604.115204][T11869]  dev_hard_start_xmit+0xbb/0x9b0
[  604.121446][T11869]  ? validate_xmit_skb_list+0xfc/0x150
[  604.127132][T11869]  sch_direct_xmit+0x372/0xd30
[  604.132019][T11869]  ? dev_watchdog+0xca0/0xca0
[  604.136721][T11869]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  604.142379][T11869]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  604.148383][T11869]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  604.154874][T11869]  ? sfb_dequeue+0x421/0x4d0
[  604.159513][T11869]  __qdisc_run+0x4bf/0x1770
[  604.164068][T11869]  __dev_queue_xmit+0x1650/0x35c0
[  604.169126][T11869]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  604.174433][T11869]  ? mark_held_locks+0xf0/0xf0
[  604.179217][T11869]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  604.185477][T11869]  ? debug_smp_processor_id+0x33/0x18a
[  604.190956][T11869]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  604.197143][T11869]  ? rcu_read_lock_held_common+0xbd/0x130
[  604.202887][T11869]  dev_queue_xmit+0x18/0x20
[  604.207437][T11869]  ? dev_queue_xmit+0x18/0x20
20:00:06 executing program 2:
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0)

[  604.212130][T11869]  neigh_direct_output+0x16/0x20
[  604.217090][T11869]  ip6_finish_output2+0x109a/0x25c0
[  604.222314][T11869]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  604.227885][T11869]  ? lock_downgrade+0x920/0x920
[  604.232780][T11869]  ? netif_rx_ni+0x670/0x670
[  604.237384][T11869]  ? __kasan_check_read+0x11/0x20
[  604.242436][T11869]  __ip6_finish_output+0x444/0xaa0
[  604.248610][T11869]  ? __ip6_finish_output+0x444/0xaa0
[  604.253929][T11869]  ip6_finish_output+0x38/0x1f0
[  604.258800][T11869]  ip6_output+0x25e/0x880
[  604.263153][T11869]  ? ip6_finish_output+0x1f0/0x1f0
[  604.268282][T11869]  ? __ip6_finish_output+0xaa0/0xaa0
[  604.273574][T11869]  ? ip6_make_skb+0x370/0x570
[  604.278254][T11869]  ? ip_reply_glue_bits+0xc0/0xc0
[  604.283284][T11869]  ip6_local_out+0xbb/0x1b0
[  604.287795][T11869]  ip6_send_skb+0xbb/0x350
[  604.292275][T11869]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  604.298266][T11869]  ? ip6_forward_finish+0x570/0x570
[  604.303480][T11869]  udpv6_sendmsg+0x22f3/0x2b30
[  604.308248][T11869]  ? __kasan_check_write+0x14/0x20
[  604.313360][T11869]  ? ip_reply_glue_bits+0xc0/0xc0
[  604.318391][T11869]  ? udp_v6_get_port+0x6b0/0x6b0
[  604.323316][T11869]  ? __kasan_check_read+0x11/0x20
[  604.328333][T11869]  ? mark_lock+0xc2/0x1220
[  604.332742][T11869]  ? __kasan_check_read+0x11/0x20
[  604.337758][T11869]  ? mark_lock+0xc2/0x1220
[  604.342160][T11869]  ? __kasan_check_read+0x11/0x20
[  604.347177][T11869]  ? ___might_sleep+0x163/0x2c0
[  604.352031][T11869]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  604.357651][T11869]  ? aa_sk_perm+0x346/0xb00
[  604.362152][T11869]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  604.367698][T11869]  inet6_sendmsg+0x9e/0xe0
[  604.372102][T11869]  ? inet6_sendmsg+0x9e/0xe0
[  604.376681][T11869]  ? inet6_ioctl+0x1c0/0x1c0
[  604.381276][T11869]  sock_sendmsg+0xd7/0x130
[  604.385716][T11869]  ____sys_sendmsg+0x358/0x880
[  604.390492][T11869]  ? kernel_sendmsg+0x50/0x50
[  604.395190][T11869]  ? __fget+0x35d/0x550
[  604.399346][T11869]  ? find_held_lock+0x35/0x130
[  604.404113][T11869]  ___sys_sendmsg+0x100/0x170
[  604.408781][T11869]  ? sendmsg_copy_msghdr+0x70/0x70
[  604.413890][T11869]  ? __kasan_check_read+0x11/0x20
[  604.418902][T11869]  ? __fget+0x37f/0x550
[  604.423067][T11869]  ? do_dup2+0x4f0/0x4f0
[  604.427296][T11869]  ? find_held_lock+0x35/0x130
[  604.432134][T11869]  ? get_pid_task+0x11d/0x210
[  604.436813][T11869]  ? __fget_light+0x1a9/0x230
[  604.441487][T11869]  ? __fdget+0x1b/0x20
[  604.445653][T11869]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  604.451895][T11869]  ? sockfd_lookup_light+0xcb/0x180
[  604.457089][T11869]  __sys_sendmmsg+0x1bf/0x4d0
[  604.461852][T11869]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  604.466892][T11869]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  604.473137][T11869]  ? fput_many+0x12c/0x1a0
[  604.477548][T11869]  ? fput+0x1b/0x20
[  604.481344][T11869]  ? ksys_write+0x1cf/0x290
[  604.485843][T11869]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  604.491292][T11869]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  604.496751][T11869]  ? do_syscall_64+0x26/0x790
[  604.501432][T11869]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  604.507492][T11869]  ? do_syscall_64+0x26/0x790
[  604.512169][T11869]  __x64_sys_sendmmsg+0x9d/0x100
[  604.517122][T11869]  do_syscall_64+0xfa/0x790
[  604.521627][T11869]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  604.527513][T11869] RIP: 0033:0x45a919
[  604.531395][T11869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  604.550998][T11869] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  604.559406][T11869] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
20:00:06 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  604.567368][T11869] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  604.575332][T11869] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  604.583290][T11869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  604.591246][T11869] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  604.707123][T11886] x_tables: duplicate underflow at hook 2
[  604.741864][T11892] x_tables: duplicate underflow at hook 2
20:00:06 executing program 3 (fault-call:2 fault-nth:6):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:06 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0)
r2 = socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161)
ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0)
r3 = socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000))
socket$kcm(0x2, 0x2, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x800004}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
getpid()
mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0)

20:00:06 executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x22, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000633277fbac141416e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28)

[  604.968890][T11901] FAULT_INJECTION: forcing a failure.
[  604.968890][T11901] name failslab, interval 1, probability 0, space 0, times 0
[  605.008873][T11901] CPU: 1 PID: 11901 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  605.020121][T11901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  605.030195][T11901] Call Trace:
[  605.033494][T11901]  dump_stack+0x197/0x210
[  605.037831][T11901]  should_fail.cold+0xa/0x10
[  605.042554][T11901]  ? setup_fault_attr+0x220/0x220
[  605.047597][T11901]  ? ___might_sleep+0x163/0x2c0
[  605.052490][T11901]  __should_failslab+0x121/0x190
[  605.057466][T11901]  should_failslab+0x9/0x14
[  605.061974][T11901]  kmem_cache_alloc_node+0x268/0x740
[  605.067256][T11901]  ? __dev_queue_xmit+0x173f/0x35c0
[  605.072543][T11901]  ? trace_hardirqs_on+0x67/0x240
[  605.077586][T11901]  ? __dev_queue_xmit+0x173f/0x35c0
[  605.082816][T11901]  __alloc_skb+0xd5/0x5e0
[  605.087167][T11901]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  605.092851][T11901]  alloc_skb_with_frags+0x93/0x590
[  605.097985][T11901]  ? find_held_lock+0x35/0x130
[  605.102774][T11901]  sock_alloc_send_pskb+0x7ad/0x920
[  605.108010][T11901]  ? sock_wmalloc+0x120/0x120
[  605.112756][T11901]  ? __local_bh_enable_ip+0x15a/0x270
[  605.118144][T11901]  ? ip6_finish_output2+0x1106/0x25c0
[  605.123516][T11901]  ? ip6_mtu+0x2e6/0x450
[  605.127779][T11901]  ? find_held_lock+0x35/0x130
[  605.132580][T11901]  sock_alloc_send_skb+0x32/0x40
[  605.137519][T11901]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  605.143244][T11901]  ? ip_reply_glue_bits+0xc0/0xc0
[  605.148278][T11901]  ? ip6_setup_cork+0x1920/0x1920
[  605.153295][T11901]  ? ip6_flush_pending_frames+0xd0/0xd0
[  605.161700][T11901]  ? __kasan_check_read+0x11/0x20
[  605.166719][T11901]  ip6_make_skb+0x32f/0x570
[  605.171210][T11901]  ? ip_reply_glue_bits+0xc0/0xc0
[  605.176235][T11901]  ? ip_reply_glue_bits+0xc0/0xc0
[  605.181256][T11901]  ? ip6_push_pending_frames+0xf0/0xf0
[  605.186866][T11901]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  605.192437][T11901]  ? ip6_forward_finish+0x570/0x570
[  605.197640][T11901]  ? rcu_read_lock_held+0x9c/0xb0
[  605.202663][T11901]  udpv6_sendmsg+0x22a1/0x2b30
[  605.207428][T11901]  ? __kasan_check_write+0x14/0x20
[  605.212538][T11901]  ? ip_reply_glue_bits+0xc0/0xc0
[  605.217554][T11901]  ? udp_v6_get_port+0x6b0/0x6b0
[  605.222519][T11901]  ? __kasan_check_read+0x11/0x20
[  605.227540][T11901]  ? mark_lock+0xc2/0x1220
[  605.231958][T11901]  ? __kasan_check_read+0x11/0x20
[  605.236976][T11901]  ? mark_lock+0xc2/0x1220
[  605.241489][T11901]  ? __kasan_check_read+0x11/0x20
[  605.246592][T11901]  ? ___might_sleep+0x163/0x2c0
[  605.251476][T11901]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  605.257194][T11901]  ? aa_sk_perm+0x346/0xb00
[  605.261720][T11901]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  605.267270][T11901]  inet6_sendmsg+0x9e/0xe0
[  605.271675][T11901]  ? inet6_sendmsg+0x9e/0xe0
[  605.276256][T11901]  ? inet6_ioctl+0x1c0/0x1c0
[  605.280893][T11901]  sock_sendmsg+0xd7/0x130
[  605.285296][T11901]  ____sys_sendmsg+0x358/0x880
[  605.290048][T11901]  ? kernel_sendmsg+0x50/0x50
[  605.294712][T11901]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  605.300243][T11901]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  605.306529][T11901]  ? find_held_lock+0x35/0x130
[  605.311304][T11901]  ___sys_sendmsg+0x100/0x170
[  605.316063][T11901]  ? sendmsg_copy_msghdr+0x70/0x70
[  605.321281][T11901]  ? __kasan_check_read+0x11/0x20
[  605.326401][T11901]  ? __might_fault+0x12b/0x1e0
[  605.331249][T11901]  ? find_held_lock+0x35/0x130
[  605.336001][T11901]  ? __might_fault+0x12b/0x1e0
[  605.340753][T11901]  ? do_dup2+0x4f0/0x4f0
[  605.344988][T11901]  ? lock_downgrade+0x920/0x920
[  605.349842][T11901]  ? ___might_sleep+0x163/0x2c0
[  605.354683][T11901]  __sys_sendmmsg+0x1bf/0x4d0
[  605.359361][T11901]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  605.364391][T11901]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  605.370900][T11901]  ? fput_many+0x12c/0x1a0
[  605.375312][T11901]  ? fput+0x1b/0x20
[  605.379458][T11901]  ? ksys_write+0x1cf/0x290
[  605.383966][T11901]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  605.389429][T11901]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  605.395204][T11901]  ? do_syscall_64+0x26/0x790
[  605.400150][T11901]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  605.406767][T11901]  ? do_syscall_64+0x26/0x790
[  605.411986][T11901]  __x64_sys_sendmmsg+0x9d/0x100
[  605.416937][T11901]  do_syscall_64+0xfa/0x790
[  605.421728][T11901]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  605.427638][T11901] RIP: 0033:0x45a919
[  605.431528][T11901] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  605.451301][T11901] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  605.460387][T11901] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  605.468888][T11901] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  605.477017][T11901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  605.485359][T11901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  605.493352][T11901] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  606.688815][    C0] net_ratelimit: 14 callbacks suppressed
[  606.688825][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  606.700331][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  606.768655][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  606.774473][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  606.928660][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  606.934502][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  607.578686][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  607.584527][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  607.590566][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  607.596310][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  611.738633][    C0] net_ratelimit: 16 callbacks suppressed
[  611.738639][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  611.751106][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  611.757110][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  611.762929][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  612.928805][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  612.934651][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  613.008624][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  613.014556][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  613.168630][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  613.174939][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:16 executing program 3 (fault-call:2 fault-nth:7):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:16 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303019303030303030303030302c00"])
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:00:16 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x4)
sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="39000000140081ae00002c000500018701546fabca1b4e7db89c40ebb37358582bdbb7d553b4e921556b3d5df500"/57, 0x39}], 0x1}, 0x0)

20:00:16 executing program 0:
sysinfo(&(0x7f0000000000)=""/22)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)}, 0x0)
r0 = socket$inet(0x10, 0x2, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ff2000/0xc000)=nil, 0x800, 0x1, 0x1b09814380623961, &(0x7f0000ffc000/0x3000)=nil, 0x466e})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0)
ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000200)={0x0, 0x4, 0x100a})
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f00000000c0))
r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x155000, 0x0)
write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x7, 0x21, 0x1}, 0x7)
sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40000)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00=\x00', @ifru_flags})

20:00:16 executing program 5:
r0 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0x0, 0x80000)
sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000002a40)={&(0x7f0000002940)={0x10, 0x0, 0x0, 0x379c0f036ac8e7bc}, 0xc, &(0x7f0000002a00)={&(0x7f0000002980)={0x60, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1ff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xb673e40d511f4971}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x800)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x5cbaecce2c75b182, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6000)
io_setup(0x1ff, &(0x7f00000004c0)=<r3=>0x0)
io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}])
r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r5, &(0x7f0000000180)={0xfffffffffffffe58, 0x7b, 0x1}, 0x56a)
r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200000, 0x0)
setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0)
fdatasync(r5)
getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000100)=0x4)
ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5})
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f00000001c0)={@local, @rand_addr, <r8=>0x0}, &(0x7f0000000240)=0xc)
setsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000280)={@remote, r8}, 0x14)

20:00:16 executing program 4:
setreuid(0x0, 0xee00)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x9, @loopback, 0x100}, @in6={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}}}, 0x118)
r1 = geteuid()
setreuid(0x0, 0x0)
mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0)
lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0x2}]}, 0x14, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setreuid(r1, r1)
execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0)

20:00:16 executing program 4:
r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfff, 0x400080)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0)
ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000340)={0x5, 0x0, 0x2, 0x6, 0x0, 0xfe})
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000010000507000000001000000000000000", @ANYRES32=r4, @ANYBLOB="00000000000000001400030062617408002000f10b0000141012000c007df0626f6e6400000000040002009394983b0807fcddc74de90f96af94d3c3d28f5ebc8754eee28b3eabe900"/85], 0x50}}, 0x0)
ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280))
setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @local}, 0x10)
ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000000)={0x8, 'team_slave_0\x00', {'batadv0\x00'}, 0x100})
perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd9ce, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00')
preadv(r5, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

[  614.164593][T11924] FAULT_INJECTION: forcing a failure.
[  614.164593][T11924] name failslab, interval 1, probability 0, space 0, times 0
20:00:16 executing program 2:
syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00')
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x3da, 0x0)
get_thread_area(&(0x7f0000000000)={0x1, 0x20000000, 0x3400, 0x0, 0x1, 0x0, 0x0, 0x1})
bpf$MAP_CREATE(0x0, 0x0, 0x0)

[  614.339493][T11924] CPU: 1 PID: 11924 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  614.350209][T11924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  614.350216][T11924] Call Trace:
[  614.350239][T11924]  dump_stack+0x197/0x210
[  614.350264][T11924]  should_fail.cold+0xa/0x10
[  614.350285][T11924]  ? setup_fault_attr+0x220/0x220
[  614.350306][T11924]  ? ___might_sleep+0x163/0x2c0
[  614.350329][T11924]  __should_failslab+0x121/0x190
[  614.350346][T11924]  should_failslab+0x9/0x14
[  614.350367][T11924]  kmem_cache_alloc_node_trace+0x274/0x750
[  614.393153][T11924]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  614.393172][T11924]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  614.393196][T11924]  __kmalloc_node_track_caller+0x3d/0x70
[  614.393218][T11924]  __kmalloc_reserve.isra.0+0x40/0xf0
[  614.393241][T11924]  __alloc_skb+0x10b/0x5e0
[  614.393259][T11924]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  614.393283][T11924]  alloc_skb_with_frags+0x93/0x590
20:00:16 executing program 0:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc)
r2 = syz_open_procfs(r0, &(0x7f0000000140)='net/mcfilter\x00')
r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00')
preadv(r3, &(0x7f0000001300)=[{&(0x7f0000000180)=""/68, 0x44}], 0x1, 0x0)
preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003)

[  614.437844][T11924]  ? find_held_lock+0x35/0x130
[  614.442643][T11924]  sock_alloc_send_pskb+0x7ad/0x920
[  614.447895][T11924]  ? sock_wmalloc+0x120/0x120
[  614.452680][T11924]  ? __local_bh_enable_ip+0x15a/0x270
[  614.458078][T11924]  ? ip6_finish_output2+0x1106/0x25c0
[  614.463554][T11924]  ? ip6_mtu+0x2e6/0x450
[  614.467815][T11924]  ? find_held_lock+0x35/0x130
[  614.472603][T11924]  sock_alloc_send_skb+0x32/0x40
[  614.477565][T11924]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  614.483405][T11924]  ? ip_reply_glue_bits+0xc0/0xc0
[  614.484996][T11944] Unknown ioctl 1075332544
[  614.488454][T11924]  ? ip6_setup_cork+0x1920/0x1920
[  614.488475][T11924]  ? ip6_flush_pending_frames+0xd0/0xd0
[  614.488489][T11924]  ? __kasan_check_read+0x11/0x20
[  614.488510][T11924]  ip6_make_skb+0x32f/0x570
[  614.503672][T11924]  ? ip_reply_glue_bits+0xc0/0xc0
[  614.518316][T11924]  ? ip_reply_glue_bits+0xc0/0xc0
[  614.518337][T11924]  ? ip6_push_pending_frames+0xf0/0xf0
[  614.518358][T11924]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  614.534508][T11924]  ? ip6_forward_finish+0x570/0x570
[  614.539738][T11924]  ? rcu_read_lock_held+0x9c/0xb0
[  614.544796][T11924]  udpv6_sendmsg+0x22a1/0x2b30
[  614.549587][T11924]  ? __kasan_check_write+0x14/0x20
[  614.554809][T11924]  ? ip_reply_glue_bits+0xc0/0xc0
[  614.559874][T11924]  ? udp_v6_get_port+0x6b0/0x6b0
[  614.564835][T11924]  ? __kasan_check_read+0x11/0x20
[  614.569966][T11924]  ? mark_lock+0xc2/0x1220
[  614.574407][T11924]  ? __kasan_check_read+0x11/0x20
[  614.579454][T11924]  ? mark_lock+0xc2/0x1220
[  614.583901][T11924]  ? __kasan_check_read+0x11/0x20
[  614.588955][T11924]  ? ___might_sleep+0x163/0x2c0
[  614.593834][T11924]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  614.599628][T11924]  ? aa_sk_perm+0x346/0xb00
[  614.604167][T11924]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  614.609752][T11924]  inet6_sendmsg+0x9e/0xe0
[  614.614203][T11924]  ? inet6_sendmsg+0x9e/0xe0
[  614.618823][T11924]  ? inet6_ioctl+0x1c0/0x1c0
[  614.623439][T11924]  sock_sendmsg+0xd7/0x130
[  614.627885][T11924]  ____sys_sendmsg+0x358/0x880
[  614.632671][T11924]  ? kernel_sendmsg+0x50/0x50
[  614.637371][T11924]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  614.642946][T11924]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  614.648945][T11924]  ? find_held_lock+0x35/0x130
[  614.653739][T11924]  ___sys_sendmsg+0x100/0x170
[  614.658555][T11924]  ? sendmsg_copy_msghdr+0x70/0x70
[  614.664419][T11924]  ? __kasan_check_read+0x11/0x20
[  614.669491][T11924]  ? __might_fault+0x12b/0x1e0
[  614.674300][T11924]  ? find_held_lock+0x35/0x130
[  614.679085][T11924]  ? __might_fault+0x12b/0x1e0
[  614.683888][T11924]  ? do_dup2+0x4f0/0x4f0
[  614.688154][T11924]  ? lock_downgrade+0x920/0x920
[  614.693052][T11924]  ? ___might_sleep+0x163/0x2c0
[  614.697932][T11924]  __sys_sendmmsg+0x1bf/0x4d0
[  614.702640][T11924]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  614.707699][T11924]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  614.713990][T11924]  ? fput_many+0x12c/0x1a0
[  614.718417][T11924]  ? fput+0x1b/0x20
[  614.722244][T11924]  ? ksys_write+0x1cf/0x290
[  614.726779][T11924]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  614.732269][T11924]  ? trace_hardirqs_on_thunk+0x1a/0x1c
20:00:16 executing program 0:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0)
syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f00000003c0)="640084e002000a0400000000000000c98f4fe842fb8b1fafddf2e59578782f8a106b53bf466093d563ae3aa161c153280db0f2c02cdd9f65d7082fbe739257f3abefabbc6ac3d0f736a657079e899e3ef78f13bd46c912f5491d9918e52c35c285961aa995fcee09ebad46643598ebbf57d6d4c960f49d9271afd6080e16dfbc02359704d7a4627ce54d1b0773de24ad836f36", 0x93, 0x400}], 0x1, 0x0)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
r2 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r3=>0x0}, &(0x7f0000000040)=0x386)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r3, 0x8, 0x20}, &(0x7f0000000080)=0xc)
umount2(&(0x7f0000000180)='./file0\x00', 0x0)

[  614.737757][T11924]  ? do_syscall_64+0x26/0x790
[  614.742459][T11924]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  614.748549][T11924]  ? do_syscall_64+0x26/0x790
[  614.753255][T11924]  __x64_sys_sendmmsg+0x9d/0x100
[  614.758224][T11924]  do_syscall_64+0xfa/0x790
[  614.762753][T11924]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  614.768658][T11924] RIP: 0033:0x45a919
[  614.772574][T11924] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  614.792187][T11924] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  614.792203][T11924] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  614.792210][T11924] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  614.792218][T11924] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  614.792227][T11924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  614.792236][T11924] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:00:16 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0)
getsockname(r0, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x0)
mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x80000, &(0x7f0000000200)='vboxnet0\x00')
getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000180), 0x0)
listen(r0, 0x5)
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$IOC_WATCH_QUEUE_SET_FILTER(r3, 0x5761, &(0x7f0000000480)={0x7, 0x0, [{0x8, 0x0, 0x0, [0xf7, 0x5, 0x6, 0x9, 0x9, 0x7, 0xfff]}, {0xffffffff, 0x409, 0x1, [0x0, 0xb886, 0x1, 0x3ff, 0xdf, 0x1, 0x4, 0x8001]}, {0x6, 0x7ff, 0x1, [0x100, 0x8000, 0x10000, 0x4, 0x1ff, 0x6, 0x10, 0x1]}, {0x9, 0x0, 0x400, [0x18, 0x9, 0x5, 0x8, 0x5, 0x2, 0xfffff494]}, {0xfffffffc, 0x1, 0x4, [0x2, 0xa1305aab, 0x10000, 0x5, 0x200, 0x5, 0x3, 0x9]}, {0x3, 0x7, 0x5, [0x1, 0x0, 0x40, 0x7, 0x7, 0x3, 0xa24b, 0x4]}, {0xfffffeff, 0x76, 0x80000000, [0x101, 0x85, 0x42, 0x8, 0x100, 0x1000, 0x1, 0xa8a7]}]})
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0xb9, 0x4)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4)
syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H')
socket$inet6(0xa, 0x1, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00')
bind$alg(r1, 0x0, 0x0)
accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)

20:00:16 executing program 3 (fault-call:2 fault-nth:8):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  614.798625][   T27] audit: type=1800 audit(1577390416.451:61): pid=11952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16582 res=0
20:00:17 executing program 2:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000100)={{0x0, 0x1, 0x5, 0xe4, 'syz1\x00', 0x1}, 0x0, 0x30, 0x7, r0, 0x0, 0x80, 'syz1\x00', &(0x7f0000000080), 0x0, [], [0x5, 0x9, 0x4, 0x4d6a]})

[  615.139554][T11970] FAULT_INJECTION: forcing a failure.
[  615.139554][T11970] name failslab, interval 1, probability 0, space 0, times 0
[  615.166062][T11970] CPU: 0 PID: 11970 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  615.176361][T11970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  615.187415][T11970] Call Trace:
[  615.190735][T11970]  dump_stack+0x197/0x210
[  615.195126][T11970]  should_fail.cold+0xa/0x10
[  615.199828][T11970]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  615.205150][T11970]  ? setup_fault_attr+0x220/0x220
[  615.210286][T11970]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  615.215607][T11970]  __should_failslab+0x121/0x190
[  615.220601][T11970]  should_failslab+0x9/0x14
[  615.225138][T11970]  kmem_cache_alloc+0x47/0x710
[  615.230018][T11970]  ? __kasan_check_read+0x11/0x20
[  615.235077][T11970]  skb_clone+0x154/0x3d0
[  615.239368][T11970]  ip6_finish_output2+0x18be/0x25c0
[  615.244588][T11970]  ? ip6_mtu+0x2e6/0x450
[  615.248860][T11970]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  615.254447][T11970]  ? lock_downgrade+0x920/0x920
[  615.259328][T11970]  ? rcu_read_lock_held+0x9c/0xb0
[  615.264512][T11970]  ? __kasan_check_read+0x11/0x20
[  615.269919][T11970]  __ip6_finish_output+0x444/0xaa0
[  615.275072][T11970]  ? __ip6_finish_output+0x444/0xaa0
[  615.280466][T11970]  ip6_finish_output+0x38/0x1f0
[  615.285519][T11970]  ip6_output+0x25e/0x880
[  615.289869][T11970]  ? ip6_finish_output+0x1f0/0x1f0
[  615.295113][T11970]  ? __ip6_finish_output+0xaa0/0xaa0
[  615.300416][T11970]  ? ip6_make_skb+0x370/0x570
[  615.305138][T11970]  ? ip_reply_glue_bits+0xc0/0xc0
[  615.310305][T11970]  ip6_local_out+0xbb/0x1b0
[  615.314842][T11970]  ip6_send_skb+0xbb/0x350
[  615.319292][T11970]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  615.324770][T11970]  ? ip6_forward_finish+0x570/0x570
[  615.330077][T11970]  udpv6_sendmsg+0x22f3/0x2b30
[  615.334929][T11970]  ? __kasan_check_write+0x14/0x20
[  615.340294][T11970]  ? ip_reply_glue_bits+0xc0/0xc0
[  615.345324][T11970]  ? udp_v6_get_port+0x6b0/0x6b0
[  615.350251][T11970]  ? __kasan_check_read+0x11/0x20
[  615.355263][T11970]  ? mark_lock+0xc2/0x1220
[  615.359682][T11970]  ? __kasan_check_read+0x11/0x20
[  615.364698][T11970]  ? mark_lock+0xc2/0x1220
[  615.369102][T11970]  ? __kasan_check_read+0x11/0x20
[  615.374120][T11970]  ? ___might_sleep+0x163/0x2c0
[  615.378984][T11970]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  615.384705][T11970]  ? aa_sk_perm+0x346/0xb00
[  615.389299][T11970]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  615.394855][T11970]  inet6_sendmsg+0x9e/0xe0
[  615.399263][T11970]  ? inet6_sendmsg+0x9e/0xe0
[  615.403847][T11970]  ? inet6_ioctl+0x1c0/0x1c0
[  615.408475][T11970]  sock_sendmsg+0xd7/0x130
[  615.413030][T11970]  ____sys_sendmsg+0x358/0x880
[  615.418683][T11970]  ? kernel_sendmsg+0x50/0x50
[  615.423571][T11970]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  615.429112][T11970]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  615.435083][T11970]  ? find_held_lock+0x35/0x130
[  615.439936][T11970]  ___sys_sendmsg+0x100/0x170
[  615.444602][T11970]  ? sendmsg_copy_msghdr+0x70/0x70
[  615.449703][T11970]  ? __kasan_check_read+0x11/0x20
[  615.454715][T11970]  ? __might_fault+0x12b/0x1e0
[  615.459472][T11970]  ? find_held_lock+0x35/0x130
[  615.464228][T11970]  ? __might_fault+0x12b/0x1e0
[  615.469070][T11970]  ? do_dup2+0x4f0/0x4f0
[  615.473304][T11970]  ? lock_downgrade+0x920/0x920
[  615.478157][T11970]  ? ___might_sleep+0x163/0x2c0
[  615.482996][T11970]  __sys_sendmmsg+0x1bf/0x4d0
[  615.487676][T11970]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  615.492705][T11970]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  615.498934][T11970]  ? fput_many+0x12c/0x1a0
[  615.503336][T11970]  ? fput+0x1b/0x20
[  615.507133][T11970]  ? ksys_write+0x1cf/0x290
[  615.512264][T11970]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  615.517770][T11970]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  615.523225][T11970]  ? do_syscall_64+0x26/0x790
[  615.527892][T11970]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  615.533951][T11970]  ? do_syscall_64+0x26/0x790
[  615.538629][T11970]  __x64_sys_sendmmsg+0x9d/0x100
[  615.543563][T11970]  do_syscall_64+0xfa/0x790
[  615.548055][T11970]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  615.554120][T11970] RIP: 0033:0x45a919
[  615.558006][T11970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  615.577595][T11970] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  615.586010][T11970] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  615.594055][T11970] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  615.602187][T11970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  615.610336][T11970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  615.618296][T11970] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:00:19 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:00:19 executing program 0:
r0 = socket(0x200000000000011, 0x4000000000080002, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000540)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="beea392bb673b48341bcc061749e2602c373ada90e37d0effc181a59274d6c6bd9082e18"], 0x48}}, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r7, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$nl_route_sched(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="0b1f39ffead38b0f6b5daf02e69c30689f84282425c95ff1878afdb1e2de364b46b437b4fc9a5aefa985281ef1d889fee6832af55078bfb4c72baf9f953e0cff46ced98d9ad2600b0a42ee41ea708e494efa71540dadae6f40749d3438c7a7c83f62e7ee5a183267f508451e8b644817094812182fbb66fc855133b67750721baae5c3061de9ccfd5f12ddd82a562cdf72f65253a2c2c5705daa5e0647315664be507b9588042009f851573dcaf006da6d2ad1b5198deece661417653afa93764615788e8c9ca2730a62d3cf4073d9a13967b4b244196187897bd5bfeb3d0b9db9fb8de28a4c0a2e84974d"], @ANYRES32=r4, @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES16=r1, @ANYRESDEC=r7, @ANYBLOB="0d36f6a66d4ead7b65e957404a344cc32f994aaf8b3bb59db9ad26733ff67cd9d84f2e5a37152c3ed9805a61ec", @ANYRESHEX=r8, @ANYRES64]], 0x3}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r4, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ipz\t\x00\x94\x00\xe6U\x00', <r9=>r4})
bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r9, 0x1, 0x0, 0x6, @dev}, 0x14)
ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x26, 0x2, 0x4, 0xa, 0x3, 0xcb70, 0x2, 0xec, 0xffffffffffffffff})
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r10=>0xffffffffffffffff, <r11=>0xffffffffffffffff})
llistxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)=""/68, 0x44)
r12 = fcntl$dupfd(r11, 0x0, r10)
ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200)
sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0)
getsockopt$packet_int(r12, 0x107, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4)

20:00:19 executing program 3 (fault-call:2 fault-nth:9):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  617.088708][    C0] net_ratelimit: 14 callbacks suppressed
[  617.088717][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  617.100329][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  617.178664][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  617.180635][T11984] FAULT_INJECTION: forcing a failure.
[  617.180635][T11984] name failslab, interval 1, probability 0, space 0, times 0
[  617.184556][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  617.197111][T11984] CPU: 1 PID: 11984 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  617.212710][T11984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  617.224699][T11984] Call Trace:
[  617.224723][T11984]  dump_stack+0x197/0x210
[  617.224744][T11984]  should_fail.cold+0xa/0x10
[  617.224760][T11984]  ? is_bpf_text_address+0xac/0x160
[  617.224777][T11984]  ? setup_fault_attr+0x220/0x220
[  617.224802][T11984]  __should_failslab+0x121/0x190
[  617.224825][T11984]  should_failslab+0x9/0x14
[  617.242381][T11984]  kmem_cache_alloc+0x47/0x710
[  617.242400][T11984]  ? lock_acquire+0x190/0x410
[  617.242418][T11984]  ? net_tx_action+0xd30/0xd30
[  617.242436][T11984]  skb_clone+0x154/0x3d0
[  617.242453][T11984]  dev_queue_xmit_nit+0x3a1/0xaa0
[  617.242478][T11984]  dev_hard_start_xmit+0xbb/0x9b0
[  617.257882][T11984]  ? validate_xmit_skb_list+0xfc/0x150
[  617.257906][T11984]  sch_direct_xmit+0x372/0xd30
[  617.257928][T11984]  ? dev_watchdog+0xca0/0xca0
[  617.272158][T11984]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  617.272175][T11984]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  617.272198][T11984]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  617.286473][T11984]  ? sfb_dequeue+0x421/0x4d0
[  617.286495][T11984]  __qdisc_run+0x4bf/0x1770
[  617.286525][T11984]  __dev_queue_xmit+0x1650/0x35c0
[  617.296827][T11984]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  617.296849][T11984]  ? mark_held_locks+0xf0/0xf0
[  617.296871][T11984]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  617.307052][T11984]  ? debug_smp_processor_id+0x33/0x18a
[  617.307074][T11984]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  617.307094][T11984]  ? rcu_read_lock_held_common+0xbd/0x130
[  617.319299][T11984]  dev_queue_xmit+0x18/0x20
[  617.319316][T11984]  ? dev_queue_xmit+0x18/0x20
[  617.319334][T11984]  neigh_direct_output+0x16/0x20
[  617.319350][T11984]  ip6_finish_output2+0x109a/0x25c0
[  617.319374][T11984]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  617.319388][T11984]  ? lock_downgrade+0x920/0x920
[  617.319411][T11984]  ? netif_rx_ni+0x670/0x670
[  617.328782][T11984]  ? __kasan_check_read+0x11/0x20
[  617.328807][T11984]  __ip6_finish_output+0x444/0xaa0
[  617.328822][T11984]  ? __ip6_finish_output+0x444/0xaa0
[  617.328842][T11984]  ip6_finish_output+0x38/0x1f0
[  617.328859][T11984]  ip6_output+0x25e/0x880
[  617.328877][T11984]  ? ip6_finish_output+0x1f0/0x1f0
[  617.328900][T11984]  ? __ip6_finish_output+0xaa0/0xaa0
[  617.339202][T11984]  ? ip6_make_skb+0x370/0x570
[  617.339221][T11984]  ? ip_reply_glue_bits+0xc0/0xc0
[  617.339243][T11984]  ip6_local_out+0xbb/0x1b0
[  617.339261][T11984]  ip6_send_skb+0xbb/0x350
[  617.339282][T11984]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  617.339300][T11984]  ? ip6_forward_finish+0x570/0x570
[  617.350496][T11984]  udpv6_sendmsg+0x22f3/0x2b30
[  617.350519][T11984]  ? __kasan_check_write+0x14/0x20
[  617.350537][T11984]  ? ip_reply_glue_bits+0xc0/0xc0
[  617.350560][T11984]  ? udp_v6_get_port+0x6b0/0x6b0
[  617.350579][T11984]  ? __kasan_check_read+0x11/0x20
[  617.362158][T11984]  ? mark_lock+0xc2/0x1220
[  617.362182][T11984]  ? __kasan_check_read+0x11/0x20
[  617.362196][T11984]  ? mark_lock+0xc2/0x1220
[  617.362211][T11984]  ? __kasan_check_read+0x11/0x20
[  617.362236][T11984]  ? ___might_sleep+0x163/0x2c0
[  617.515588][T11984]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  617.521237][T11984]  ? aa_sk_perm+0x346/0xb00
[  617.525738][T11984]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  617.531274][T11984]  inet6_sendmsg+0x9e/0xe0
[  617.535690][T11984]  ? inet6_sendmsg+0x9e/0xe0
[  617.540269][T11984]  ? inet6_ioctl+0x1c0/0x1c0
[  617.544843][T11984]  sock_sendmsg+0xd7/0x130
[  617.549253][T11984]  ____sys_sendmsg+0x358/0x880
[  617.554003][T11984]  ? kernel_sendmsg+0x50/0x50
[  617.558669][T11984]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  617.564201][T11984]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  617.570176][T11984]  ? find_held_lock+0x35/0x130
[  617.574942][T11984]  ___sys_sendmsg+0x100/0x170
[  617.579633][T11984]  ? sendmsg_copy_msghdr+0x70/0x70
[  617.584738][T11984]  ? __kasan_check_read+0x11/0x20
[  617.589764][T11984]  ? __might_fault+0x12b/0x1e0
[  617.594526][T11984]  ? find_held_lock+0x35/0x130
[  617.599281][T11984]  ? __might_fault+0x12b/0x1e0
[  617.604038][T11984]  ? do_dup2+0x4f0/0x4f0
[  617.608266][T11984]  ? lock_downgrade+0x920/0x920
[  617.613112][T11984]  ? ___might_sleep+0x163/0x2c0
[  617.617946][T11984]  __sys_sendmmsg+0x1bf/0x4d0
[  617.622622][T11984]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  617.627819][T11984]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  617.634077][T11984]  ? fput_many+0x12c/0x1a0
[  617.638511][T11984]  ? fput+0x1b/0x20
[  617.642319][T11984]  ? ksys_write+0x1cf/0x290
[  617.646842][T11984]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  617.652288][T11984]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  617.657819][T11984]  ? do_syscall_64+0x26/0x790
[  617.662954][T11984]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  617.669103][T11984]  ? do_syscall_64+0x26/0x790
[  617.673879][T11984]  __x64_sys_sendmmsg+0x9d/0x100
[  617.678807][T11984]  do_syscall_64+0xfa/0x790
[  617.683300][T11984]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  617.689190][T11984] RIP: 0033:0x45a919
[  617.693090][T11984] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  617.712697][T11984] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  617.721135][T11984] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  617.729113][T11984] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  617.737072][T11984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  617.745042][T11984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  617.753025][T11984] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  617.768819][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  617.774700][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  617.978692][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  617.984514][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  617.990424][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  617.996330][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  622.128637][    C0] net_ratelimit: 16 callbacks suppressed
[  622.128644][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  622.140188][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  622.146093][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  622.151959][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  623.328720][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  623.334800][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  623.408679][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  623.414478][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:25 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x5, 0x0)
sendmmsg$sock(r1, &(0x7f0000000e40)=[{{&(0x7f0000000640)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="a505f433e20dc8cac80e6aaee80fc7e109029fe295b84a1f3918031af7cefd2db03e607df8628086c03baa964b8d782c56f79c8d87ed1d59d731bf837b9c73a3cc481e72498dbdcc82d3eec479fa", 0x4e}, {&(0x7f0000000800)="bc169dc499ca407d719ff6613a9f88f26fdde945d5b8dead163999cd5340c16836bcb27d11141c829cc3551a2f71235841f556a4d88c846e9571c3096bbf76c0f6e5a8a72b09864ee068911bd897439f18a785b1014860dbeeba6185d45dcb8222747c", 0x63}, {&(0x7f00000008c0)="fad935728d116a5343e9a23afd5cbd3bfb78cb335e3f00ea106c4c5cc979555f5f945c4d387e896fffdeefbd8ba92d2a70bed4ad5f08cd3cac5cf10673ce23bf86512ab7ecfdae7e8484b0066fdcab1298c1a59c27bda622be375f1cb98199da9085cfc8cabd5a12463f944d449ae9fa", 0x70}, {&(0x7f00000009c0)="e7e09f", 0x3}], 0x5, &(0x7f0000000b00)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0xff}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x60}}, {{&(0x7f0000000b80)=@generic={0x4, "0bc4d63fc1c1198d358ccdf8e117d3f30656890668f15dd4b8c1a33c36768185f0014fce28808239b59ca134b1601473dd4ede4568df9e061470ac88923249732d124c885b1669488547b56e307c1f0677abc48e62af22cf19ad53891000da78a6ec16c5c29b1a3c2f99050b7f521ee20d0fab0693f80ad8aada5b3771ad"}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000c00)="d8e7fb1609be36b36a6c80e795f66e2adf7f243eee7ab4a745957f37dbb135564902b65497", 0x25}, {&(0x7f0000000c80)="541a996e15ef81a220cc40492d7e09c8def81696b45bbc31d807a706e94dab450acf4aedccad770574846a04d629d12d65eafe06225740ab2f403ed4127568d04d91446ad166a73456334f091c0bd5dd733f286ac5f437b23e2aca4c8cc4ed644f0c834c579b2bf3ee0f54d0f3aa1a4ec8653ec84f49c002eecf42691fa1a9efb71d5d473c84a8d382f0435513cc5edd13111a2cf3d66573a03e8089c62b9fb1d227f130430e63ae8f290e8eb6", 0xad}], 0x2, &(0x7f0000000d80)=[@mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x80d}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x78}}], 0x2, 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
gettid()
r3 = msgget(0x0, 0x964906915ff8a84)
msgsnd(r3, &(0x7f0000000440)={0x3, "d034d0ace9d4717dadfe79381772192b7e986519bbe79c1e990c865dfc9092b8743f4b872b2eaf5a11b4c51c33c364a819eb2dc1d6b0729f25c2be0e65f9444e74498ff5007b305c7996325e78e805c69f0cf71cf645f7be684c45354f55fe3b040ee3eaedfd5e4f880de2e6ae82cc71eed9e52f5f0c1e4578751bc9fee0b3a6fef8abb925d410539a47ceacda"}, 0x95, 0x0)
bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8004e22}, 0x1c)
setsockopt$sock_int(r2, 0x1, 0xa, &(0x7f0000000400)=0xfffffffffffffff7, 0x4)
dup(r2)
sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
read(r2, &(0x7f0000000180)=""/139, 0x8b)
sendto$inet6(r2, &(0x7f00000000c0)='w', 0x1, 0x4000008081, 0x0, 0x0)
fcntl$setlease(r2, 0x400, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0)
lsetxattr$trusted_overlay_nlink(&(0x7f0000000540)='./file0\x00', 0x0, &(0x7f00000005c0)={'L+', 0x5}, 0x28, 0x3)
getdents(r0, &(0x7f00000000c0)=""/65, 0x311a52cb38ef9127)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)=<r4=>0x0)
capget(&(0x7f0000000240)={0x0, r4}, &(0x7f0000000280)={0x2, 0x7fffffff, 0x1, 0xa04, 0x0, 0x97a})
r5 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0)
openat$dir(0xffffffffffffff9c, 0x0, 0x1, 0x40)
r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x80000, 0x0)
getsockopt$inet_dccp_buf(r6, 0x21, 0xcd, &(0x7f0000001440)=""/4096, &(0x7f0000000300)=0x1000)

20:00:25 executing program 4:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080))
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000180))
ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e)
r2 = socket$kcm(0xa, 0x3, 0x73)
r3 = socket$inet6_sctp(0xa, 0x1, 0x84)
recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000000)=""/199, 0xc7, 0x80, &(0x7f0000000100)={{0x3, @null, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}, 0x48)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r3})

20:00:25 executing program 2:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/de\xab\x00vsock\x00', 0x1, 0x0)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
r3 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r4=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r4}, &(0x7f00000002c0)=0x8)
setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={r4, 0x5, 0x20}, 0xc)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000200)={0xf020000, 0x7fffffff, 0x2263, <r7=>r6, 0x0, &(0x7f00000001c0)={0x30379, 0x3ff, [], @value=0x4}})
r8 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$netlink(r8, 0x10e, 0x6, &(0x7f0000000380)=""/13, &(0x7f0000000540)=0xd)
r9 = socket$pptp(0x18, 0x1, 0x2)
ioctl$VIDIOC_S_EDID(r5, 0xc0285629, &(0x7f0000000440)={0x0, 0x9, 0xfd2, [], &(0x7f0000000400)=0x1})
r10 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$sock_SIOCGIFCONF(r10, 0x8912, &(0x7f0000000340)=@buf={0x1b, &(0x7f0000000300)="430c9ccd9179e9c39df6fe7b1be6bd5e1a3e8295dc168b75578495"})
fsetxattr$trusted_overlay_redirect(r9, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x1)
mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='\x03p\x04', 0x1104000, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0x40}}, {@loose='loose'}], [{@obj_role={'obj_role', 0x3d, '[@wlan0\''}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'msize'}}]}})
syz_open_procfs(0x0, 0xffffffffffffffff)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$VT_GETMODE(r11, 0x5601, &(0x7f0000000100))

20:00:25 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:00:25 executing program 3 (fault-call:2 fault-nth:10):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:25 executing program 0:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x800, 0x0, 0x2, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x1a)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492bd3aa3d41fd", 0x3e}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
dup(0xffffffffffffffff)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x3)
creat(0x0, 0x0)

[  623.526074][T12004] FAULT_INJECTION: forcing a failure.
[  623.526074][T12004] name failslab, interval 1, probability 0, space 0, times 0
[  623.550306][T12004] CPU: 0 PID: 12004 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  623.560336][T12004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  623.570803][T12004] Call Trace:
[  623.574142][T12004]  dump_stack+0x197/0x210
[  623.578492][T12004]  should_fail.cold+0xa/0x10
[  623.583100][T12004]  ? setup_fault_attr+0x220/0x220
[  623.583120][T12004]  ? ___might_sleep+0x163/0x2c0
[  623.583144][T12004]  __should_failslab+0x121/0x190
[  623.597955][T12004]  should_failslab+0x9/0x14
[  623.602486][T12004]  kmem_cache_alloc_node+0x268/0x740
[  623.607881][T12004]  ? __dev_queue_xmit+0x173f/0x35c0
[  623.613113][T12004]  ? trace_hardirqs_on+0x67/0x240
[  623.618162][T12004]  ? __dev_queue_xmit+0x173f/0x35c0
20:00:25 executing program 4:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600)
write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:modem_device_t:s0\x00', 0x24)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000440)=ANY=[@ANYRES16=r0], &(0x7f0000000100)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x78)
getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4)

20:00:25 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IGNORE_DF={0x8}]]}}}]}, 0x38}}, 0x0)
r3 = fcntl$getown(0xffffffffffffffff, 0x9)
r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000180)=""/104)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x4, @perf_bp={&(0x7f0000000200), 0x2}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r3, 0x4, 0xffffffffffffffff, 0x8)
r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x111000, 0x0)
ioctl$KDSETLED(r5, 0x4b32, 0xff)

[  623.623396][T12004]  __alloc_skb+0xd5/0x5e0
[  623.627771][T12004]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  623.633352][T12004]  alloc_skb_with_frags+0x93/0x590
[  623.638632][T12004]  ? find_held_lock+0x35/0x130
[  623.643440][T12004]  sock_alloc_send_pskb+0x7ad/0x920
[  623.648664][T12004]  ? sock_wmalloc+0x120/0x120
[  623.653348][T12004]  ? __local_bh_enable_ip+0x15a/0x270
[  623.658736][T12004]  ? ip6_finish_output2+0x1106/0x25c0
[  623.664239][T12004]  ? ip6_mtu+0x2e6/0x450
[  623.668532][T12004]  ? find_held_lock+0x35/0x130
[  623.673323][T12004]  sock_alloc_send_skb+0x32/0x40
[  623.678286][T12004]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  623.684032][T12004]  ? ip_reply_glue_bits+0xc0/0xc0
[  623.689069][T12004]  ? ip6_setup_cork+0x1920/0x1920
[  623.689086][T12004]  ? ip6_flush_pending_frames+0xd0/0xd0
[  623.689099][T12004]  ? __kasan_check_read+0x11/0x20
[  623.689116][T12004]  ip6_make_skb+0x32f/0x570
[  623.689134][T12004]  ? ip_reply_glue_bits+0xc0/0xc0
[  623.714535][T12004]  ? ip_reply_glue_bits+0xc0/0xc0
[  623.719617][T12004]  ? ip6_push_pending_frames+0xf0/0xf0
[  623.725281][T12004]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  623.730858][T12004]  ? ip6_forward_finish+0x570/0x570
[  623.736076][T12004]  ? rcu_read_lock_held+0x9c/0xb0
[  623.738563][T12016] netlink: 'syz-executor.4': attribute type 19 has an invalid length.
[  623.741125][T12004]  udpv6_sendmsg+0x22a1/0x2b30
[  623.741150][T12004]  ? __kasan_check_write+0x14/0x20
[  623.741173][T12004]  ? ip_reply_glue_bits+0xc0/0xc0
[  623.764367][T12004]  ? udp_v6_get_port+0x6b0/0x6b0
[  623.769359][T12004]  ? __kasan_check_read+0x11/0x20
[  623.774461][T12004]  ? mark_lock+0xc2/0x1220
[  623.778995][T12004]  ? __kasan_check_read+0x11/0x20
[  623.784029][T12004]  ? mark_lock+0xc2/0x1220
[  623.788463][T12004]  ? __kasan_check_read+0x11/0x20
[  623.793500][T12004]  ? ___might_sleep+0x163/0x2c0
[  623.798464][T12004]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  623.804105][T12004]  ? aa_sk_perm+0x346/0xb00
[  623.808746][T12004]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  623.814327][T12004]  inet6_sendmsg+0x9e/0xe0
[  623.818767][T12004]  ? inet6_sendmsg+0x9e/0xe0
[  623.823383][T12004]  ? inet6_ioctl+0x1c0/0x1c0
[  623.827998][T12004]  sock_sendmsg+0xd7/0x130
[  623.832441][T12004]  ____sys_sendmsg+0x358/0x880
[  623.837218][T12004]  ? kernel_sendmsg+0x50/0x50
[  623.841896][T12004]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  623.847437][T12004]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  623.853416][T12004]  ? find_held_lock+0x35/0x130
[  623.858178][T12004]  ___sys_sendmsg+0x100/0x170
[  623.862855][T12004]  ? sendmsg_copy_msghdr+0x70/0x70
[  623.867991][T12004]  ? __kasan_check_read+0x11/0x20
[  623.873028][T12004]  ? __might_fault+0x12b/0x1e0
[  623.877780][T12004]  ? find_held_lock+0x35/0x130
[  623.882632][T12004]  ? __might_fault+0x12b/0x1e0
[  623.887408][T12004]  ? do_dup2+0x4f0/0x4f0
[  623.891643][T12004]  ? lock_downgrade+0x920/0x920
[  623.896631][T12004]  ? ___might_sleep+0x163/0x2c0
[  623.901497][T12004]  __sys_sendmmsg+0x1bf/0x4d0
[  623.906167][T12004]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  623.911209][T12004]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  623.917447][T12004]  ? fput_many+0x12c/0x1a0
[  623.921852][T12004]  ? fput+0x1b/0x20
[  623.925647][T12004]  ? ksys_write+0x1cf/0x290
[  623.930240][T12004]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  623.935684][T12004]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  623.941148][T12004]  ? do_syscall_64+0x26/0x790
[  623.945818][T12004]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  623.951871][T12004]  ? do_syscall_64+0x26/0x790
[  623.956538][T12004]  __x64_sys_sendmmsg+0x9d/0x100
[  623.961488][T12004]  do_syscall_64+0xfa/0x790
[  623.965981][T12004]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  623.971872][T12004] RIP: 0033:0x45a919
[  623.975751][T12004] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  623.995350][T12004] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  624.003764][T12004] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  624.011728][T12004] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  624.019717][T12004] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
20:00:26 executing program 3 (fault-call:2 fault-nth:11):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  624.027771][T12004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  624.035948][T12004] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  624.044317][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  624.050196][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  624.117805][T12026] FAULT_INJECTION: forcing a failure.
[  624.117805][T12026] name failslab, interval 1, probability 0, space 0, times 0
[  624.139327][T12026] CPU: 0 PID: 12026 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  624.149241][T12026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  624.159291][T12026] Call Trace:
[  624.162581][T12026]  dump_stack+0x197/0x210
[  624.166929][T12026]  should_fail.cold+0xa/0x10
[  624.171546][T12026]  ? setup_fault_attr+0x220/0x220
[  624.176835][T12026]  ? ___might_sleep+0x163/0x2c0
[  624.181692][T12026]  __should_failslab+0x121/0x190
[  624.186625][T12026]  should_failslab+0x9/0x14
[  624.191124][T12026]  kmem_cache_alloc_node_trace+0x274/0x750
[  624.197023][T12026]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  624.203186][T12026]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  624.209101][T12026]  __kmalloc_node_track_caller+0x3d/0x70
[  624.214768][T12026]  __kmalloc_reserve.isra.0+0x40/0xf0
[  624.220227][T12026]  __alloc_skb+0x10b/0x5e0
[  624.224749][T12026]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  624.230320][T12026]  alloc_skb_with_frags+0x93/0x590
[  624.235871][T12026]  ? find_held_lock+0x35/0x130
[  624.240704][T12026]  sock_alloc_send_pskb+0x7ad/0x920
[  624.245974][T12026]  ? sock_wmalloc+0x120/0x120
[  624.250756][T12026]  ? __local_bh_enable_ip+0x15a/0x270
[  624.256138][T12026]  ? ip6_finish_output2+0x1106/0x25c0
[  624.261592][T12026]  ? ip6_mtu+0x2e6/0x450
[  624.265832][T12026]  ? find_held_lock+0x35/0x130
[  624.270673][T12026]  sock_alloc_send_skb+0x32/0x40
[  624.275628][T12026]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  624.281465][T12026]  ? ip_reply_glue_bits+0xc0/0xc0
[  624.286503][T12026]  ? ip6_setup_cork+0x1920/0x1920
[  624.291711][T12026]  ? ip6_flush_pending_frames+0xd0/0xd0
[  624.297244][T12026]  ? __kasan_check_read+0x11/0x20
[  624.302285][T12026]  ip6_make_skb+0x32f/0x570
[  624.307113][T12026]  ? ip_reply_glue_bits+0xc0/0xc0
[  624.312315][T12026]  ? ip_reply_glue_bits+0xc0/0xc0
[  624.317358][T12026]  ? ip6_push_pending_frames+0xf0/0xf0
[  624.322910][T12026]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  624.328464][T12026]  ? ip6_forward_finish+0x570/0x570
[  624.333669][T12026]  ? rcu_read_lock_held+0x9c/0xb0
[  624.338704][T12026]  udpv6_sendmsg+0x22a1/0x2b30
[  624.343639][T12026]  ? __kasan_check_write+0x14/0x20
[  624.348751][T12026]  ? ip_reply_glue_bits+0xc0/0xc0
[  624.353800][T12026]  ? udp_v6_get_port+0x6b0/0x6b0
[  624.358732][T12026]  ? __kasan_check_read+0x11/0x20
[  624.363743][T12026]  ? mark_lock+0xc2/0x1220
[  624.368162][T12026]  ? __kasan_check_read+0x11/0x20
[  624.373176][T12026]  ? mark_lock+0xc2/0x1220
[  624.377587][T12026]  ? __kasan_check_read+0x11/0x20
[  624.382605][T12026]  ? ___might_sleep+0x163/0x2c0
[  624.387455][T12026]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  624.393101][T12026]  ? aa_sk_perm+0x346/0xb00
[  624.397636][T12026]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  624.403279][T12026]  inet6_sendmsg+0x9e/0xe0
[  624.407699][T12026]  ? inet6_sendmsg+0x9e/0xe0
[  624.412286][T12026]  ? inet6_ioctl+0x1c0/0x1c0
[  624.416869][T12026]  sock_sendmsg+0xd7/0x130
[  624.421295][T12026]  ____sys_sendmsg+0x358/0x880
[  624.426063][T12026]  ? kernel_sendmsg+0x50/0x50
[  624.430731][T12026]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  624.436268][T12026]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  624.442238][T12026]  ? find_held_lock+0x35/0x130
[  624.447034][T12026]  ___sys_sendmsg+0x100/0x170
[  624.451719][T12026]  ? sendmsg_copy_msghdr+0x70/0x70
[  624.456822][T12026]  ? __kasan_check_read+0x11/0x20
[  624.461835][T12026]  ? __might_fault+0x12b/0x1e0
[  624.466601][T12026]  ? find_held_lock+0x35/0x130
[  624.471364][T12026]  ? __might_fault+0x12b/0x1e0
[  624.476134][T12026]  ? do_dup2+0x4f0/0x4f0
[  624.480379][T12026]  ? lock_downgrade+0x920/0x920
[  624.485245][T12026]  ? ___might_sleep+0x163/0x2c0
[  624.490096][T12026]  __sys_sendmmsg+0x1bf/0x4d0
[  624.494775][T12026]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  624.499829][T12026]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  624.506113][T12026]  ? fput_many+0x12c/0x1a0
[  624.510518][T12026]  ? fput+0x1b/0x20
[  624.514320][T12026]  ? ksys_write+0x1cf/0x290
[  624.518816][T12026]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  624.524287][T12026]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  624.529754][T12026]  ? do_syscall_64+0x26/0x790
[  624.534880][T12026]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  624.541032][T12026]  ? do_syscall_64+0x26/0x790
[  624.545729][T12026]  __x64_sys_sendmmsg+0x9d/0x100
[  624.550657][T12026]  do_syscall_64+0xfa/0x790
[  624.555150][T12026]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  624.561028][T12026] RIP: 0033:0x45a919
[  624.564921][T12026] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  624.584699][T12026] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  624.593128][T12026] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  624.601136][T12026] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  624.609097][T12026] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
20:00:26 executing program 3 (fault-call:2 fault-nth:12):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  624.617157][T12026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  624.625140][T12026] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  624.659569][T12019] netlink: 'syz-executor.4': attribute type 19 has an invalid length.
20:00:26 executing program 2:
pipe2$9p(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
close(r1)
signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8)
write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7)
mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0)

[  624.707896][T12033] FAULT_INJECTION: forcing a failure.
[  624.707896][T12033] name failslab, interval 1, probability 0, space 0, times 0
[  624.773599][T12033] CPU: 0 PID: 12033 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  624.783542][T12033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  624.793673][T12033] Call Trace:
[  624.796959][T12033]  dump_stack+0x197/0x210
[  624.801430][T12033]  should_fail.cold+0xa/0x10
[  624.806022][T12033]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  624.811317][T12033]  ? setup_fault_attr+0x220/0x220
[  624.816351][T12033]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  624.821653][T12033]  __should_failslab+0x121/0x190
[  624.826597][T12033]  should_failslab+0x9/0x14
[  624.831111][T12033]  kmem_cache_alloc+0x47/0x710
[  624.835876][T12033]  ? __kasan_check_read+0x11/0x20
[  624.840889][T12033]  skb_clone+0x154/0x3d0
[  624.845121][T12033]  ip6_finish_output2+0x18be/0x25c0
[  624.850318][T12033]  ? ip6_mtu+0x2e6/0x450
[  624.854572][T12033]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  624.860126][T12033]  ? lock_downgrade+0x920/0x920
[  624.864970][T12033]  ? rcu_read_lock_held+0x9c/0xb0
[  624.869983][T12033]  ? __kasan_check_read+0x11/0x20
[  624.875011][T12033]  __ip6_finish_output+0x444/0xaa0
[  624.880178][T12033]  ? __ip6_finish_output+0x444/0xaa0
[  624.885475][T12033]  ip6_finish_output+0x38/0x1f0
[  624.890457][T12033]  ip6_output+0x25e/0x880
[  624.894791][T12033]  ? ip6_finish_output+0x1f0/0x1f0
[  624.900002][T12033]  ? __ip6_finish_output+0xaa0/0xaa0
[  624.905287][T12033]  ? ip6_make_skb+0x370/0x570
[  624.909973][T12033]  ? ip_reply_glue_bits+0xc0/0xc0
[  624.915002][T12033]  ip6_local_out+0xbb/0x1b0
[  624.919496][T12033]  ip6_send_skb+0xbb/0x350
[  624.923902][T12033]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  624.929393][T12033]  ? ip6_forward_finish+0x570/0x570
[  624.934669][T12033]  udpv6_sendmsg+0x22f3/0x2b30
[  624.939420][T12033]  ? __kasan_check_write+0x14/0x20
[  624.944531][T12033]  ? ip_reply_glue_bits+0xc0/0xc0
[  624.949555][T12033]  ? udp_v6_get_port+0x6b0/0x6b0
[  624.954477][T12033]  ? __kasan_check_read+0x11/0x20
[  624.959498][T12033]  ? mark_lock+0xc2/0x1220
[  624.963914][T12033]  ? __kasan_check_read+0x11/0x20
[  624.968923][T12033]  ? mark_lock+0xc2/0x1220
[  624.973347][T12033]  ? __kasan_check_read+0x11/0x20
[  624.978370][T12033]  ? ___might_sleep+0x163/0x2c0
[  624.983224][T12033]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  624.988855][T12033]  ? aa_sk_perm+0x346/0xb00
[  624.993352][T12033]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  624.998898][T12033]  inet6_sendmsg+0x9e/0xe0
[  625.003299][T12033]  ? inet6_sendmsg+0x9e/0xe0
[  625.007878][T12033]  ? inet6_ioctl+0x1c0/0x1c0
[  625.012471][T12033]  sock_sendmsg+0xd7/0x130
[  625.016872][T12033]  ____sys_sendmsg+0x358/0x880
[  625.021634][T12033]  ? kernel_sendmsg+0x50/0x50
[  625.026295][T12033]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  625.031835][T12033]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  625.037806][T12033]  ? find_held_lock+0x35/0x130
[  625.042560][T12033]  ___sys_sendmsg+0x100/0x170
[  625.047420][T12033]  ? sendmsg_copy_msghdr+0x70/0x70
[  625.052545][T12033]  ? __kasan_check_read+0x11/0x20
[  625.057567][T12033]  ? __might_fault+0x12b/0x1e0
[  625.062326][T12033]  ? find_held_lock+0x35/0x130
[  625.067075][T12033]  ? __might_fault+0x12b/0x1e0
[  625.071826][T12033]  ? do_dup2+0x4f0/0x4f0
[  625.076058][T12033]  ? lock_downgrade+0x920/0x920
[  625.080898][T12033]  ? ___might_sleep+0x163/0x2c0
[  625.085733][T12033]  __sys_sendmmsg+0x1bf/0x4d0
[  625.090395][T12033]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  625.095438][T12033]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  625.101678][T12033]  ? fput_many+0x12c/0x1a0
[  625.106090][T12033]  ? fput+0x1b/0x20
[  625.109990][T12033]  ? ksys_write+0x1cf/0x290
[  625.114506][T12033]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  625.120022][T12033]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  625.125476][T12033]  ? do_syscall_64+0x26/0x790
[  625.130158][T12033]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  625.136336][T12033]  ? do_syscall_64+0x26/0x790
[  625.141117][T12033]  __x64_sys_sendmmsg+0x9d/0x100
[  625.146066][T12033]  do_syscall_64+0xfa/0x790
[  625.150586][T12033]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  625.156477][T12033] RIP: 0033:0x45a919
[  625.160367][T12033] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  625.179969][T12033] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  625.188366][T12033] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  625.196348][T12033] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  625.204322][T12033] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  625.212383][T12033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
20:00:27 executing program 3 (fault-call:2 fault-nth:13):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  625.220371][T12033] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  625.349329][T12043] FAULT_INJECTION: forcing a failure.
[  625.349329][T12043] name failslab, interval 1, probability 0, space 0, times 0
[  625.362679][T12043] CPU: 1 PID: 12043 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  625.372568][T12043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  625.383153][T12043] Call Trace:
[  625.383178][T12043]  dump_stack+0x197/0x210
[  625.383200][T12043]  should_fail.cold+0xa/0x10
[  625.383215][T12043]  ? is_bpf_text_address+0xac/0x160
[  625.383233][T12043]  ? setup_fault_attr+0x220/0x220
[  625.383261][T12043]  __should_failslab+0x121/0x190
[  625.383278][T12043]  should_failslab+0x9/0x14
[  625.383297][T12043]  kmem_cache_alloc+0x47/0x710
[  625.420015][T12043]  ? lock_acquire+0x190/0x410
[  625.424715][T12043]  ? net_tx_action+0xd30/0xd30
[  625.429509][T12043]  skb_clone+0x154/0x3d0
[  625.433774][T12043]  dev_queue_xmit_nit+0x3a1/0xaa0
[  625.438818][T12043]  dev_hard_start_xmit+0xbb/0x9b0
[  625.443889][T12043]  ? validate_xmit_skb_list+0xfc/0x150
[  625.449361][T12043]  sch_direct_xmit+0x372/0xd30
[  625.454138][T12043]  ? dev_watchdog+0xca0/0xca0
[  625.458814][T12043]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  625.464351][T12043]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  625.470415][T12043]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  625.476724][T12043]  ? sfb_dequeue+0x421/0x4d0
[  625.481357][T12043]  __qdisc_run+0x4bf/0x1770
[  625.485858][T12043]  __dev_queue_xmit+0x1650/0x35c0
[  625.490917][T12043]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  625.496467][T12043]  ? mark_held_locks+0xf0/0xf0
[  625.501427][T12043]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  625.507803][T12043]  ? debug_smp_processor_id+0x33/0x18a
[  625.513278][T12043]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  625.519443][T12043]  ? rcu_read_lock_held_common+0xbd/0x130
[  625.525163][T12043]  dev_queue_xmit+0x18/0x20
[  625.529988][T12043]  ? dev_queue_xmit+0x18/0x20
[  625.534771][T12043]  neigh_direct_output+0x16/0x20
[  625.539728][T12043]  ip6_finish_output2+0x109a/0x25c0
[  625.544934][T12043]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  625.550485][T12043]  ? lock_downgrade+0x920/0x920
[  625.555336][T12043]  ? netif_rx_ni+0x670/0x670
[  625.559914][T12043]  ? __kasan_check_read+0x11/0x20
[  625.564929][T12043]  __ip6_finish_output+0x444/0xaa0
[  625.570039][T12043]  ? __ip6_finish_output+0x444/0xaa0
[  625.575415][T12043]  ip6_finish_output+0x38/0x1f0
[  625.580259][T12043]  ip6_output+0x25e/0x880
[  625.584606][T12043]  ? ip6_finish_output+0x1f0/0x1f0
[  625.589726][T12043]  ? __ip6_finish_output+0xaa0/0xaa0
[  625.595023][T12043]  ? ip6_make_skb+0x370/0x570
[  625.599686][T12043]  ? ip_reply_glue_bits+0xc0/0xc0
[  625.604716][T12043]  ip6_local_out+0xbb/0x1b0
[  625.609221][T12043]  ip6_send_skb+0xbb/0x350
[  625.613654][T12043]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  625.619471][T12043]  ? ip6_forward_finish+0x570/0x570
[  625.624679][T12043]  udpv6_sendmsg+0x22f3/0x2b30
[  625.629446][T12043]  ? __kasan_check_write+0x14/0x20
[  625.634564][T12043]  ? ip_reply_glue_bits+0xc0/0xc0
[  625.639590][T12043]  ? udp_v6_get_port+0x6b0/0x6b0
[  625.644516][T12043]  ? __kasan_check_read+0x11/0x20
[  625.649540][T12043]  ? mark_lock+0xc2/0x1220
[  625.653972][T12043]  ? __kasan_check_read+0x11/0x20
[  625.659010][T12043]  ? mark_lock+0xc2/0x1220
[  625.663610][T12043]  ? __kasan_check_read+0x11/0x20
[  625.668646][T12043]  ? ___might_sleep+0x163/0x2c0
[  625.673532][T12043]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  625.679171][T12043]  ? aa_sk_perm+0x346/0xb00
[  625.683695][T12043]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  625.689263][T12043]  inet6_sendmsg+0x9e/0xe0
[  625.693745][T12043]  ? inet6_sendmsg+0x9e/0xe0
[  625.698388][T12043]  ? inet6_ioctl+0x1c0/0x1c0
[  625.703014][T12043]  sock_sendmsg+0xd7/0x130
[  625.707452][T12043]  ____sys_sendmsg+0x358/0x880
[  625.712222][T12043]  ? kernel_sendmsg+0x50/0x50
[  625.716889][T12043]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  625.722450][T12043]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  625.728434][T12043]  ? find_held_lock+0x35/0x130
[  625.733196][T12043]  ___sys_sendmsg+0x100/0x170
[  625.737864][T12043]  ? sendmsg_copy_msghdr+0x70/0x70
[  625.742976][T12043]  ? __kasan_check_read+0x11/0x20
[  625.748003][T12043]  ? __might_fault+0x12b/0x1e0
[  625.752762][T12043]  ? find_held_lock+0x35/0x130
[  625.757527][T12043]  ? __might_fault+0x12b/0x1e0
[  625.762296][T12043]  ? do_dup2+0x4f0/0x4f0
[  625.766539][T12043]  ? lock_downgrade+0x920/0x920
[  625.771408][T12043]  ? ___might_sleep+0x163/0x2c0
[  625.776248][T12043]  __sys_sendmmsg+0x1bf/0x4d0
[  625.780933][T12043]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  625.785989][T12043]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  625.792234][T12043]  ? fput_many+0x12c/0x1a0
[  625.796673][T12043]  ? fput+0x1b/0x20
[  625.800518][T12043]  ? ksys_write+0x1cf/0x290
[  625.805042][T12043]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  625.810615][T12043]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  625.816172][T12043]  ? do_syscall_64+0x26/0x790
[  625.820858][T12043]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  625.826933][T12043]  ? do_syscall_64+0x26/0x790
[  625.831605][T12043]  __x64_sys_sendmmsg+0x9d/0x100
[  625.836553][T12043]  do_syscall_64+0xfa/0x790
[  625.841077][T12043]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  625.846973][T12043] RIP: 0033:0x45a919
[  625.850870][T12043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  625.870567][T12043] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  625.878993][T12043] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  625.886965][T12043] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  625.894929][T12043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  625.902913][T12043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  625.910889][T12043] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  627.488657][    C0] net_ratelimit: 14 callbacks suppressed
[  627.488664][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  627.500097][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  627.568705][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  627.574662][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  628.208673][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  628.214587][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  628.768740][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  628.774890][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  628.781355][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  628.787370][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  632.928695][    C0] net_ratelimit: 16 callbacks suppressed
[  632.928703][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  632.940636][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  632.947036][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  632.953422][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  633.728664][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  633.734847][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  633.808645][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  633.814802][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  634.448624][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  634.454914][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:37 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000540)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100736662002c0042002800010000000000000000000000000000000000affe00000000000000000000ff01000000000000"], 0x58}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r3, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipmr_delroute={0xd4, 0x19, 0x400, 0x70bd25, 0x25dfdbfe, {0x80, 0x80, 0x20, 0x6, 0x100, 0x2, 0x0, 0x5, 0x200}, [@RTA_PRIORITY={0x8, 0x6, 0x1f}, @RTA_MULTIPATH={0xc, 0x9, {0x14, 0x27, 0x7, r3}}, @RTA_METRICS={0x8c, 0x8, "5f8f9e3161a3ca141c21f7379299ffd5a652d22f276c37b2a899f0ec0d4a5242e3cd2fa7599b105708260595ab0154e323555855bc7026f2822a4c08f1914d3f21a94b928741ab6a0aeb22d7c91d5feb489fe88b20eeee6db98c004a0fd124cf6885b70d9565eb870e69d172645135e2698391bac98393d172674fff18762d32b2d40ed4dc"}, @RTA_SRC={0x8, 0x2, @rand_addr=0x6}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x6}, @RTA_PRIORITY={0x8, 0x6, 0x1000}]}, 0xd4}, 0x1, 0x0, 0x0, 0x6000}, 0x0)
r4 = socket(0x10, 0x80002, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$MON_IOCX_GETX(r5, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/188, 0xbc})
add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0x0)
sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = dup3(r7, r6, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x32600)
fsconfig$FSCONFIG_SET_PATH(r9, 0x3, &(0x7f00000003c0)='syz', &(0x7f0000000500)='./file0\x00', r8)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)

20:00:37 executing program 0:
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x80002004})
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r2)
r3 = socket$inet6_sctp(0xa, 0x5, 0x84)
set_robust_list(&(0x7f00000003c0)={&(0x7f0000000380)={&(0x7f0000000340)}, 0xfffffffffffffffc}, 0x18)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r5 = dup3(r3, r4, 0x80000)
ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000140))
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc))
r6 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffa, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r7 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r7, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7)
r8 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r8, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r8, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r8, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0x9006000)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000300)=0x10)
r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r9, &(0x7f0000000680)={0xc, 0xfffffffffffffda0, 0xfa00, {&(0x7f0000000500)}}, 0xa8)
write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000000)={0x0, 0xe, 0xfa00, {0x4, &(0x7f0000000080)={<r10=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r10}}, 0x48)
write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r10, 0x2c, 0x0, @in6={0xa, 0x4e23, 0x200, @mcast1, 0x3}}}, 0x90)

20:00:37 executing program 4:
pipe(&(0x7f0000000680)={<r0=>0xffffffffffffffff})
socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
capget(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x11, 0x0, 0x300)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="390000001000090468fe07002b0000000100ff0714000000450001070300001419001a00", 0x24}], 0x1)
r1 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
write(0xffffffffffffffff, &(0x7f00000000c0)="240000005a005fdf", 0x8)
sendmmsg$alg(r1, &(0x7f0000000140), 0xcc, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0)
r4 = gettid()
sendmsg$key(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x20004850)
writev(0xffffffffffffffff, 0x0, 0x0)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0)
kcmp(0x0, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0)
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x100041)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x400, 0x0)
syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)

20:00:37 executing program 2:
setreuid(0x0, 0xee00)
r0 = geteuid()
setreuid(0x0, 0x0)
mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0)
lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{}, {0x2}]}, 0x14, 0x0)
clone(0x40000600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setreuid(r0, r0)
execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0)

20:00:37 executing program 3 (fault-call:2 fault-nth:14):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:37 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
dup2(r1, r2)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  635.193856][T12055] FAULT_INJECTION: forcing a failure.
[  635.193856][T12055] name failslab, interval 1, probability 0, space 0, times 0
[  635.220132][T12055] CPU: 1 PID: 12055 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  635.230161][T12055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  635.240396][T12055] Call Trace:
[  635.243736][T12055]  dump_stack+0x197/0x210
[  635.248761][T12055]  should_fail.cold+0xa/0x10
[  635.253854][T12055]  ? setup_fault_attr+0x220/0x220
[  635.258893][T12055]  ? ___might_sleep+0x163/0x2c0
[  635.263751][T12055]  __should_failslab+0x121/0x190
[  635.268695][T12055]  should_failslab+0x9/0x14
[  635.273310][T12055]  kmem_cache_alloc_node+0x268/0x740
[  635.278729][T12055]  ? __dev_queue_xmit+0x173f/0x35c0
[  635.284038][T12055]  ? trace_hardirqs_on+0x67/0x240
[  635.289153][T12055]  ? __dev_queue_xmit+0x173f/0x35c0
[  635.294693][T12055]  __alloc_skb+0xd5/0x5e0
[  635.299042][T12055]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  635.304582][T12055]  alloc_skb_with_frags+0x93/0x590
[  635.309751][T12055]  ? find_held_lock+0x35/0x130
[  635.314513][T12055]  sock_alloc_send_pskb+0x7ad/0x920
[  635.319971][T12055]  ? sock_wmalloc+0x120/0x120
[  635.325518][T12055]  ? __local_bh_enable_ip+0x15a/0x270
[  635.330885][T12055]  ? ip6_finish_output2+0x1106/0x25c0
[  635.336262][T12055]  ? ip6_mtu+0x2e6/0x450
[  635.340870][T12055]  ? find_held_lock+0x35/0x130
[  635.345649][T12055]  sock_alloc_send_skb+0x32/0x40
[  635.350643][T12055]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  635.356549][T12055]  ? ip_reply_glue_bits+0xc0/0xc0
[  635.361570][T12055]  ? ip6_setup_cork+0x1920/0x1920
[  635.366616][T12055]  ? ip6_flush_pending_frames+0xd0/0xd0
[  635.372165][T12055]  ? __kasan_check_read+0x11/0x20
[  635.377379][T12055]  ip6_make_skb+0x32f/0x570
[  635.381872][T12055]  ? ip_reply_glue_bits+0xc0/0xc0
[  635.386888][T12055]  ? ip_reply_glue_bits+0xc0/0xc0
[  635.392514][T12055]  ? ip6_push_pending_frames+0xf0/0xf0
[  635.398180][T12055]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  635.403739][T12055]  ? ip6_forward_finish+0x570/0x570
[  635.408932][T12055]  ? rcu_read_lock_held+0x9c/0xb0
[  635.414203][T12055]  udpv6_sendmsg+0x22a1/0x2b30
[  635.419099][T12055]  ? __kasan_check_write+0x14/0x20
[  635.424339][T12055]  ? ip_reply_glue_bits+0xc0/0xc0
[  635.429370][T12055]  ? udp_v6_get_port+0x6b0/0x6b0
[  635.434649][T12055]  ? __kasan_check_read+0x11/0x20
[  635.439751][T12055]  ? mark_lock+0xc2/0x1220
[  635.444338][T12055]  ? __kasan_check_read+0x11/0x20
[  635.449676][T12055]  ? mark_lock+0xc2/0x1220
[  635.454101][T12055]  ? __kasan_check_read+0x11/0x20
[  635.459144][T12055]  ? ___might_sleep+0x163/0x2c0
[  635.464032][T12055]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  635.469755][T12055]  ? aa_sk_perm+0x346/0xb00
[  635.474290][T12055]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  635.480210][T12055]  inet6_sendmsg+0x9e/0xe0
[  635.484647][T12055]  ? inet6_sendmsg+0x9e/0xe0
[  635.489326][T12055]  ? inet6_ioctl+0x1c0/0x1c0
[  635.493914][T12055]  sock_sendmsg+0xd7/0x130
[  635.498322][T12055]  ____sys_sendmsg+0x358/0x880
[  635.503079][T12055]  ? kernel_sendmsg+0x50/0x50
[  635.507754][T12055]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  635.513298][T12055]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  635.519274][T12055]  ? find_held_lock+0x35/0x130
[  635.524041][T12055]  ___sys_sendmsg+0x100/0x170
[  635.528715][T12055]  ? sendmsg_copy_msghdr+0x70/0x70
[  635.533819][T12055]  ? __kasan_check_read+0x11/0x20
[  635.538857][T12055]  ? __might_fault+0x12b/0x1e0
[  635.543629][T12055]  ? find_held_lock+0x35/0x130
[  635.548386][T12055]  ? __might_fault+0x12b/0x1e0
[  635.553152][T12055]  ? do_dup2+0x4f0/0x4f0
[  635.557385][T12055]  ? lock_downgrade+0x920/0x920
[  635.562236][T12055]  ? ___might_sleep+0x163/0x2c0
[  635.567175][T12055]  __sys_sendmmsg+0x1bf/0x4d0
[  635.571857][T12055]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  635.576889][T12055]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  635.583129][T12055]  ? fput_many+0x12c/0x1a0
[  635.587535][T12055]  ? fput+0x1b/0x20
[  635.591332][T12055]  ? ksys_write+0x1cf/0x290
[  635.595841][T12055]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  635.602795][T12055]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  635.608250][T12055]  ? do_syscall_64+0x26/0x790
[  635.612916][T12055]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  635.618977][T12055]  ? do_syscall_64+0x26/0x790
[  635.623670][T12055]  __x64_sys_sendmmsg+0x9d/0x100
[  635.628619][T12055]  do_syscall_64+0xfa/0x790
[  635.633116][T12055]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  635.639010][T12055] RIP: 0033:0x45a919
[  635.642899][T12055] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  635.662521][T12055] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  635.671060][T12055] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  635.679043][T12055] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  635.687002][T12055] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  635.694995][T12055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  635.704202][T12055] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  635.720716][T12063] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'.
[  635.743970][T12062] IPVS: ftp: loaded support on port[0] = 21
20:00:38 executing program 0:
ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, 0x0, 0x0)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xda00)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c)

[  635.995600][   T27] audit: type=1804 audit(1577390438.101:62): pid=12075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir755456860/syzkaller.ym7LGg/91/memory.events" dev="sda1" ino=16622 res=1
20:00:38 executing program 3 (fault-call:2 fault-nth:15):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:38 executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000200)=0x4e8)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x9d0000, 0x2, 0x1, <r2=>0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x3a0aea, 0x2, [], @value=0x10000}})
write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0e000000070000000109c3008895f3466a34070499d34f2df9f3bf5a95537baa33d8ea656655e75ef47b1e397bfee0d0ffbf7eff3c732a1eb866a60509c83cda13ff34dfb14ba1940dc87452bff8d2542f72713dee9313b2ee021ef7df45682355f9c185da4544ab9a6625ff0fa85faa9bd92ff4f280669d05012165038975ba79a40b3afd7982d526759c996e950217987e0b883cf396075cf55c6cfade1629f446699b5cd33937d232e79a6cb30287290cb707c374b735f0934a2c89ba921c27cd8786640920f073fc5ec133d83b"], 0xcf)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r3=>0xffffffffffffffff})
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
clone(0x100, 0x0, 0x0, 0x0, 0x0)
socketpair(0x5, 0x6, 0x0, &(0x7f0000000000))

20:00:38 executing program 2:
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe2(0x0, 0x0)
ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000200)=""/190)
r0 = open(0x0, 0x800000141042, 0x0)
ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080))
ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = socket(0x10, 0x2, 0x0)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xffffffffffffffa9)
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r6 = socket$inet6_sctp(0xa, 0x1, 0x84)
r7 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r8=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000380)={<r9=>r8, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000100)=0x84)
ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x3, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast]})
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={<r10=>0x0, 0x2, 0x101}, &(0x7f0000000480)=0x8)
getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000004c0)={r9, 0x1, 0x5, 0x7c, 0xdf, 0x7, 0x100, 0xffffa83a, {r10, @in={{0x2, 0x4e20, @broadcast}}, 0x4, 0x3, 0x0, 0x2, 0x8}}, &(0x7f0000000580)=0xb0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x5)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000002c0))
ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, 0x0)
r11 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r12=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r12)
getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)=<r13=>0x0)
mount$9p_unix(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='9p\x00', 0x200020, &(0x7f0000000800)=ANY=[@ANYBLOB='trans=unix,loose,dfltgid=', @ANYRESHEX=r12, @ANYBLOB=',access=user,cache=fscache,version=9p2000,noextend,version=9p2000,euid<', @ANYRESDEC=r13, @ANYBLOB="2c61707072616973655f74f297a70235501bf169672c6d61736b3d5e4d41595f455845432c00"])
syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0)
write$FUSE_BMAP(r0, &(0x7f00000005c0)={0x18, 0x0, 0x6, {0x2}}, 0x18)

20:00:38 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket(0x10, 0x80002, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000003780)=ANY=[@ANYBLOB="148000000000000000496b646045000000000000"], 0x14}}, 0x0)
sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0)

[  636.240446][T12084] FAULT_INJECTION: forcing a failure.
[  636.240446][T12084] name failslab, interval 1, probability 0, space 0, times 0
[  636.288836][T12084] CPU: 1 PID: 12084 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  636.298785][T12084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  636.309861][T12084] Call Trace:
[  636.313186][T12084]  dump_stack+0x197/0x210
[  636.317781][T12084]  should_fail.cold+0xa/0x10
[  636.323022][T12084]  ? setup_fault_attr+0x220/0x220
[  636.328279][T12084]  ? ___might_sleep+0x163/0x2c0
[  636.333159][T12084]  __should_failslab+0x121/0x190
[  636.333182][T12084]  should_failslab+0x9/0x14
[  636.333198][T12084]  kmem_cache_alloc_node_trace+0x274/0x750
[  636.333221][T12084]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  636.348587][T12084]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  636.348612][T12084]  __kmalloc_node_track_caller+0x3d/0x70
[  636.348669][T12084]  __kmalloc_reserve.isra.0+0x40/0xf0
[  636.348690][T12084]  __alloc_skb+0x10b/0x5e0
[  636.348710][T12084]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  636.348734][T12084]  alloc_skb_with_frags+0x93/0x590
[  636.383122][T12087] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (12087)
[  636.388023][T12084]  ? find_held_lock+0x35/0x130
[  636.388050][T12084]  sock_alloc_send_pskb+0x7ad/0x920
[  636.388076][T12084]  ? sock_wmalloc+0x120/0x120
[  636.388090][T12084]  ? __local_bh_enable_ip+0x15a/0x270
[  636.388106][T12084]  ? ip6_finish_output2+0x1106/0x25c0
[  636.388127][T12084]  ? ip6_mtu+0x2e6/0x450
[  636.388142][T12084]  ? find_held_lock+0x35/0x130
[  636.436228][T12084]  sock_alloc_send_skb+0x32/0x40
[  636.441249][T12084]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  636.446967][T12084]  ? ip_reply_glue_bits+0xc0/0xc0
[  636.452082][T12084]  ? ip6_setup_cork+0x1920/0x1920
[  636.457458][T12084]  ? ip6_flush_pending_frames+0xd0/0xd0
[  636.463078][T12084]  ? __kasan_check_read+0x11/0x20
[  636.468711][T12084]  ip6_make_skb+0x32f/0x570
[  636.473654][T12084]  ? ip_reply_glue_bits+0xc0/0xc0
[  636.478670][T12084]  ? ip_reply_glue_bits+0xc0/0xc0
[  636.483716][T12084]  ? ip6_push_pending_frames+0xf0/0xf0
[  636.489195][T12084]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  636.494764][T12084]  ? ip6_forward_finish+0x570/0x570
[  636.499975][T12084]  ? rcu_read_lock_held+0x9c/0xb0
[  636.505026][T12084]  udpv6_sendmsg+0x22a1/0x2b30
[  636.509795][T12084]  ? __kasan_check_write+0x14/0x20
[  636.514923][T12084]  ? ip_reply_glue_bits+0xc0/0xc0
[  636.519954][T12084]  ? udp_v6_get_port+0x6b0/0x6b0
[  636.524888][T12084]  ? __kasan_check_read+0x11/0x20
[  636.529901][T12084]  ? mark_lock+0xc2/0x1220
[  636.534316][T12084]  ? __kasan_check_read+0x11/0x20
[  636.539332][T12084]  ? mark_lock+0xc2/0x1220
[  636.543736][T12084]  ? __kasan_check_read+0x11/0x20
[  636.548751][T12084]  ? ___might_sleep+0x163/0x2c0
[  636.553593][T12084]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  636.559218][T12084]  ? aa_sk_perm+0x346/0xb00
[  636.563730][T12084]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  636.569356][T12084]  inet6_sendmsg+0x9e/0xe0
[  636.573759][T12084]  ? inet6_sendmsg+0x9e/0xe0
[  636.578341][T12084]  ? inet6_ioctl+0x1c0/0x1c0
[  636.582928][T12084]  sock_sendmsg+0xd7/0x130
[  636.587340][T12084]  ____sys_sendmsg+0x358/0x880
[  636.592178][T12084]  ? kernel_sendmsg+0x50/0x50
[  636.596841][T12084]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  636.602383][T12084]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  636.608357][T12084]  ? find_held_lock+0x35/0x130
[  636.613115][T12084]  ___sys_sendmsg+0x100/0x170
[  636.617778][T12084]  ? sendmsg_copy_msghdr+0x70/0x70
[  636.622965][T12084]  ? __kasan_check_read+0x11/0x20
[  636.627976][T12084]  ? __might_fault+0x12b/0x1e0
[  636.632737][T12084]  ? find_held_lock+0x35/0x130
[  636.637485][T12084]  ? __might_fault+0x12b/0x1e0
[  636.642239][T12084]  ? do_dup2+0x4f0/0x4f0
[  636.646470][T12084]  ? lock_downgrade+0x920/0x920
[  636.651323][T12084]  ? ___might_sleep+0x163/0x2c0
[  636.656161][T12084]  __sys_sendmmsg+0x1bf/0x4d0
[  636.660830][T12084]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  636.665860][T12084]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  636.672114][T12084]  ? fput_many+0x12c/0x1a0
[  636.676525][T12084]  ? fput+0x1b/0x20
[  636.680331][T12084]  ? ksys_write+0x1cf/0x290
[  636.684828][T12084]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  636.690287][T12084]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  636.695740][T12084]  ? do_syscall_64+0x26/0x790
[  636.700402][T12084]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  636.706455][T12084]  ? do_syscall_64+0x26/0x790
[  636.711123][T12084]  __x64_sys_sendmmsg+0x9d/0x100
[  636.716049][T12084]  do_syscall_64+0xfa/0x790
[  636.720557][T12084]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  636.726440][T12084] RIP: 0033:0x45a919
[  636.730446][T12084] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  636.750146][T12084] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  636.758548][T12084] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  636.766504][T12084] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  636.774469][T12084] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
20:00:38 executing program 0:
r0 = socket$packet(0x11, 0x400000000002, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x5}, 0x4)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
connect$l2tp(r2, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0xa9, 0x0)
sendto$ax25(r2, &(0x7f0000000040)="17a186ca99ba5e0bb3229c7582c52840fe1da7f89589f4a535cad90208f59cfc5eab7bab91f3ea87d8c87e19423d18637c4e8e1b61a068b654652f43720c8eb447c238111ee5c9ee82806cd832bc726d83a697125442a3dcb38c386cb921b3c10c959a6335908b7e92248d0afd6f965e2990891964f3a4035654b8193a173400a57ff577297935be249c10f902ad808cee2b5d9dc18c1133ee07f95f62ce466e727fe19a0cafa45aa664ba7447302edbbd1baa7b20bb8d", 0xb7, 0x80, &(0x7f0000000140)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48)

[  636.782433][T12084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  636.794992][T12084] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  637.110664][T12087] BTRFS error (device loop2): superblock checksum mismatch
[  637.235852][T12087] BTRFS error (device loop2): open_ctree failed
[  637.968662][    C0] net_ratelimit: 16 callbacks suppressed
[  637.968668][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  637.980130][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  638.608697][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  638.614623][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  639.168739][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  639.175084][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  639.181155][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  639.188099][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  639.968689][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  639.974820][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  643.328694][    C0] net_ratelimit: 14 callbacks suppressed
[  643.328703][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  643.340454][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  643.346298][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  643.352120][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  644.128674][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  644.134547][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  644.218633][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  644.224742][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:46 executing program 5:
socket$inet6_tcp(0xa, 0x1, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x844}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0)
setuid(0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xdf\xf2\x02x\x1a\x9cu\xa1\x1b\xdaN\x1c\xef\xe9\nJ\x93\xf2\xee\xe8W\xcd\xc4\xadG\x17e\xf1\xd7\xda\xf7\xa1\xcf\x1f\xa4\xd3\xe32\xa0\x8c\xd4\xd0\x9a\xbb\xe15\xf2E`\xc9SX7\x02HG\xbd.p\xf4m\x8a\xd5u\x9c\x8c\xc0\x1b\x11\xd1.C(R\x16B5_\x1cVY,M\x83x\x89\xbe\xfb\xa5\x99\x99s\xea(D\x8d0\xec\x06\x1d\xe4\x9fw\xe7\x06\x11m\xcfL\x10HW\xf3\xf7\xee_\",\a\'\x11;\x85\x8a\x80S\v\x90\xab\x13\xe4\xc93\x96\x16\'\xdc\xecq\xcdQ\x8d\xec\xe0 \x13\xbd\x1a\x1f0\xcf\xe0\n\xeds\x85\xf2\x7f\xf1\xa4\x1fam\xc7\x12\x90\xf1Z\xbf\x15\xf7t+!}B\x15\a\x13\xbf\xa7\x05\xb1M\x89\xd5\xc43\x94\x84,\xeeFw\xc8\xe7\xa9\x9a\xbe\x0f\x80\xb9\xef\xafg2\xd0\x11\x94\b`\x8apREK*\x19zq\xbcRZ\xb2\xfc#*\xdaG5}\xc0y\xb5B\xa1Aa=\xde\xb4W\xdbC\x82f\xbb\xa12\x8b\x96J\xfa.\xf3mekE\xa0\xf2\xcd\x89\xe3\x99\x9c', 0x275a, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0)
socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
connect$unix(r1, &(0x7f0000000380)=@abs={0x1, 0x0, 0x4e23}, 0x6e)
rmdir(&(0x7f0000000340)='./file0//ile0\x00')

20:00:46 executing program 4:
get_thread_area(&(0x7f0000000000)={0x5, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1})
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000003100)=[{0xffffff7f, 0x0, 0x0}], 0x500, 0x0)

20:00:46 executing program 3 (fault-call:2 fault-nth:16):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:46 executing program 2:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0xb7342b491782ba61}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xff00)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[0x0, 0x68], 0x0, 0x400, 0x3ff})

20:00:46 executing program 0:
perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x2, 0x81, 0x0, 0x0, 0x0, 0x1, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1}, 0x15, 0x0, 0x0, 0x1, 0x400}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0)
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0)
r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0)
ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000180))
socket$pptp(0x18, 0x1, 0x2)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
bind$rxrpc(r2, &(0x7f0000000100)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x8, @empty, 0xdef}}, 0x24)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340), 0x8)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = fcntl$dupfd(r0, 0x0, r1)
r6 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x8000, 0x0)
ioctl$KVM_GET_MSR_INDEX_LIST(r6, 0xc004ae02, &(0x7f00000002c0)={0x2, [0x0, 0x0]})
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x32600)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8)
keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x100, 0x0)
r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0xf4b0bbd0513ac3e3, 0x0)
r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00')
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r9, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r10, 0x10, 0x70bd2c, 0x1, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x30000811)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r11=>0xffffffffffffffff})
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000500)={'vxcan1\x00', <r12=>0x0})
bind$xdp(r4, &(0x7f0000000540)={0x2c, 0x1, r12, 0x28}, 0x10)
ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000000)=""/246)

20:00:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
dup2(r1, r2)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  644.559467][T12124] FAULT_INJECTION: forcing a failure.
[  644.559467][T12124] name failslab, interval 1, probability 0, space 0, times 0
[  644.578813][T12124] CPU: 0 PID: 12124 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  644.588751][T12124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  644.598821][T12124] Call Trace:
[  644.602147][T12124]  dump_stack+0x197/0x210
[  644.606498][T12124]  should_fail.cold+0xa/0x10
[  644.611084][T12124]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  644.616363][T12124]  ? setup_fault_attr+0x220/0x220
[  644.621394][T12124]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  644.626690][T12124]  __should_failslab+0x121/0x190
[  644.631636][T12124]  should_failslab+0x9/0x14
[  644.636136][T12124]  kmem_cache_alloc+0x47/0x710
[  644.640900][T12124]  ? __kasan_check_read+0x11/0x20
[  644.646720][T12124]  skb_clone+0x154/0x3d0
[  644.650954][T12124]  ip6_finish_output2+0x18be/0x25c0
[  644.656141][T12124]  ? ip6_mtu+0x2e6/0x450
[  644.660511][T12124]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  644.666055][T12124]  ? lock_downgrade+0x920/0x920
[  644.670897][T12124]  ? rcu_read_lock_held+0x9c/0xb0
[  644.675913][T12124]  ? __kasan_check_read+0x11/0x20
[  644.681016][T12124]  __ip6_finish_output+0x444/0xaa0
[  644.686125][T12124]  ? __ip6_finish_output+0x444/0xaa0
[  644.691944][T12124]  ip6_finish_output+0x38/0x1f0
[  644.696792][T12124]  ip6_output+0x25e/0x880
[  644.701117][T12124]  ? ip6_finish_output+0x1f0/0x1f0
[  644.706326][T12124]  ? __ip6_finish_output+0xaa0/0xaa0
[  644.711606][T12124]  ? ip6_make_skb+0x370/0x570
[  644.716294][T12124]  ? ip_reply_glue_bits+0xc0/0xc0
[  644.721316][T12124]  ip6_local_out+0xbb/0x1b0
[  644.725832][T12124]  ip6_send_skb+0xbb/0x350
[  644.730597][T12124]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  644.736305][T12124]  ? ip6_forward_finish+0x570/0x570
[  644.741595][T12124]  udpv6_sendmsg+0x22f3/0x2b30
[  644.746441][T12124]  ? __kasan_check_write+0x14/0x20
[  644.751664][T12124]  ? ip_reply_glue_bits+0xc0/0xc0
[  644.756721][T12124]  ? udp_v6_get_port+0x6b0/0x6b0
[  644.761757][T12124]  ? __kasan_check_read+0x11/0x20
[  644.766816][T12124]  ? mark_lock+0xc2/0x1220
[  644.771238][T12124]  ? __kasan_check_read+0x11/0x20
[  644.776438][T12124]  ? mark_lock+0xc2/0x1220
[  644.780932][T12124]  ? __kasan_check_read+0x11/0x20
[  644.786037][T12124]  ? ___might_sleep+0x163/0x2c0
[  644.790889][T12124]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  644.796521][T12124]  ? aa_sk_perm+0x346/0xb00
[  644.801173][T12124]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  644.806764][T12124]  inet6_sendmsg+0x9e/0xe0
[  644.811278][T12124]  ? inet6_sendmsg+0x9e/0xe0
[  644.815888][T12124]  ? inet6_ioctl+0x1c0/0x1c0
[  644.820478][T12124]  sock_sendmsg+0xd7/0x130
[  644.824899][T12124]  ____sys_sendmsg+0x358/0x880
[  644.829653][T12124]  ? kernel_sendmsg+0x50/0x50
[  644.834327][T12124]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  644.839883][T12124]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  644.845848][T12124]  ? find_held_lock+0x35/0x130
[  644.850705][T12124]  ___sys_sendmsg+0x100/0x170
[  644.855379][T12124]  ? sendmsg_copy_msghdr+0x70/0x70
[  644.860477][T12124]  ? __kasan_check_read+0x11/0x20
[  644.865505][T12124]  ? __might_fault+0x12b/0x1e0
[  644.870258][T12124]  ? find_held_lock+0x35/0x130
[  644.875009][T12124]  ? __might_fault+0x12b/0x1e0
[  644.879761][T12124]  ? do_dup2+0x4f0/0x4f0
[  644.884007][T12124]  ? lock_downgrade+0x920/0x920
[  644.888864][T12124]  ? ___might_sleep+0x163/0x2c0
[  644.893719][T12124]  __sys_sendmmsg+0x1bf/0x4d0
[  644.898397][T12124]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  644.903427][T12124]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  644.910526][T12124]  ? fput_many+0x12c/0x1a0
[  644.914936][T12124]  ? fput+0x1b/0x20
[  644.918735][T12124]  ? ksys_write+0x1cf/0x290
[  644.923241][T12124]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  644.928697][T12124]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  644.934151][T12124]  ? do_syscall_64+0x26/0x790
[  644.938836][T12124]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  644.944914][T12124]  ? do_syscall_64+0x26/0x790
[  644.949866][T12124]  __x64_sys_sendmmsg+0x9d/0x100
[  644.954893][T12124]  do_syscall_64+0xfa/0x790
[  644.959434][T12124]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  644.965318][T12124] RIP: 0033:0x45a919
[  644.969297][T12124] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  644.989344][T12124] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  644.998026][T12124] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
20:00:47 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/53, 0x35)
r2 = accept$alg(r0, 0x0, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000006b80)=[{{&(0x7f0000000200)=@hci, 0x80, 0x0, 0x0, &(0x7f0000000640)=""/20, 0x14}}, {{&(0x7f0000000680)=@rc, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000700)=""/119, 0x77}, {0x0}, {&(0x7f00000008c0)=""/230, 0xe6}, {0x0}, {&(0x7f0000000a80)=""/217, 0xd9}, {&(0x7f0000000b80)=""/82, 0x52}, {&(0x7f0000000c00)=""/4096, 0x1000}], 0x7, &(0x7f0000001e40)=""/46, 0x2e}, 0x1}, {{0x0, 0x0, &(0x7f0000003080)}}], 0x3, 0x0, 0x0)

[  645.006074][T12124] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  645.014036][T12124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  645.022011][T12124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  645.029999][T12124] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  645.038674][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  645.044472][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:47 executing program 3 (fault-call:2 fault-nth:17):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:47 executing program 4:
r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$get_security(0x11, r0, &(0x7f00000000c0), 0x0)
r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$get_security(0x11, r1, &(0x7f00000000c0), 0x0)
keyctl$search(0xa, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x0}, r1)
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x844}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
dup2(0xffffffffffffffff, r3)
connect$unix(r4, &(0x7f0000000380)=@abs={0x1, 0x0, 0x4e23}, 0x6e)
r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0)
r6 = socket(0x400000000000010, 0x802, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc)
ioctl$SIOCAX25ADDUID(r5, 0x89e1, 0x0)
ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, 0x0)
rmdir(0x0)

[  645.223277][T12140] FAULT_INJECTION: forcing a failure.
[  645.223277][T12140] name failslab, interval 1, probability 0, space 0, times 0
[  645.236199][T12140] CPU: 1 PID: 12140 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  645.246973][T12140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  645.257314][T12140] Call Trace:
[  645.260887][T12140]  dump_stack+0x197/0x210
[  645.265246][T12140]  should_fail.cold+0xa/0x10
20:00:47 executing program 2:
unshare(0x2040400)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x36c, @time={0x20, 0x4}, 0x1, {0x3f, 0x3}, 0x2, 0x1, 0x3})
add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f43", 0x5d, 0xfffffffffffffffe)
add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd)
add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0)
ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

[  645.269866][T12140]  ? is_bpf_text_address+0xac/0x160
[  645.275085][T12140]  ? setup_fault_attr+0x220/0x220
[  645.280151][T12140]  __should_failslab+0x121/0x190
[  645.285118][T12140]  should_failslab+0x9/0x14
[  645.289645][T12140]  kmem_cache_alloc+0x47/0x710
[  645.294435][T12140]  ? lock_acquire+0x190/0x410
[  645.299132][T12140]  ? net_tx_action+0xd30/0xd30
[  645.303916][T12140]  skb_clone+0x154/0x3d0
[  645.308186][T12140]  dev_queue_xmit_nit+0x3a1/0xaa0
[  645.313249][T12140]  dev_hard_start_xmit+0xbb/0x9b0
[  645.318311][T12140]  ? validate_xmit_skb_list+0xfc/0x150
20:00:47 executing program 0:
r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = fsopen(&(0x7f0000000040)='9p\x00', 0x2)
ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x20)
setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/1224], 0x4c8)
socket(0x10, 0x80002, 0xc)
socket$inet6_sctp(0xa, 0x1, 0x84)
clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={<r2=>0x0, <r3=>0x0})
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x2, 0x2, 0x4, 0x6200e800, 0xffffffcc, {r2, r3/1000+10000}, {0x4, 0x1, 0x2, 0x4, 0x3, 0x0, "0099eafa"}, 0x6, 0x4, @fd, 0x3f, 0x0, <r5=>r4})
r6 = socket$nl_route(0x10, 0x3, 0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003600)=[{{&(0x7f0000000440)=@isdn, 0x80, &(0x7f0000002e40)=[{&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000580)=""/213, 0xd5}, {&(0x7f00000004c0)=""/16, 0x10}, {&(0x7f0000000680)=""/79, 0x4f}, {&(0x7f0000000500)=""/19, 0x13}, {&(0x7f0000001c00)=""/146, 0x92}, {&(0x7f0000001cc0)=""/151, 0x97}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/78, 0x4e}, {&(0x7f0000002e00)=""/47, 0x2f}], 0xa}}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000002f00)=""/80, 0x50}, {&(0x7f0000002f80)=""/37, 0x25}, {&(0x7f0000002fc0)=""/69, 0x45}, {&(0x7f0000003040)=""/69, 0x45}, {&(0x7f00000030c0)=""/238, 0xee}, {&(0x7f00000031c0)=""/157, 0x9d}, {&(0x7f0000003280)=""/224, 0xe0}, {&(0x7f0000003380)=""/88, 0x58}, {&(0x7f0000003400)=""/183, 0xb7}, {&(0x7f00000034c0)=""/96, 0x60}], 0xa}, 0x20}], 0x2, 0x20, &(0x7f0000003680))
getsockname$packet(r8, &(0x7f0000000540)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100736662002c0042002800010000000000000000000000000000000000affe00000000000000000000ff01000000000000"], 0x58}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r9, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x2a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r9, 0x0, r5, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
pipe(&(0x7f00000008c0)={<r10=>0xffffffffffffffff})
vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

[  645.323801][T12140]  sch_direct_xmit+0x372/0xd30
[  645.328600][T12140]  ? dev_watchdog+0xca0/0xca0
[  645.333303][T12140]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  645.338879][T12140]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  645.344885][T12140]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  645.351149][T12140]  ? sfb_dequeue+0x421/0x4d0
[  645.355769][T12140]  __qdisc_run+0x4bf/0x1770
[  645.360311][T12140]  __dev_queue_xmit+0x1650/0x35c0
[  645.365384][T12140]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  645.370713][T12140]  ? mark_held_locks+0xf0/0xf0
[  645.375513][T12140]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  645.381793][T12140]  ? debug_smp_processor_id+0x33/0x18a
[  645.385069][T12146] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved
[  645.387265][T12140]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  645.387286][T12140]  ? rcu_read_lock_held_common+0xbd/0x130
[  645.387317][T12140]  dev_queue_xmit+0x18/0x20
[  645.412525][T12140]  ? dev_queue_xmit+0x18/0x20
[  645.417223][T12140]  neigh_direct_output+0x16/0x20
[  645.422228][T12140]  ip6_finish_output2+0x109a/0x25c0
[  645.427466][T12140]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  645.433044][T12140]  ? lock_downgrade+0x920/0x920
[  645.437932][T12140]  ? netif_rx_ni+0x670/0x670
[  645.442541][T12140]  ? __kasan_check_read+0x11/0x20
[  645.447621][T12140]  __ip6_finish_output+0x444/0xaa0
[  645.452750][T12140]  ? __ip6_finish_output+0x444/0xaa0
[  645.458072][T12140]  ip6_finish_output+0x38/0x1f0
[  645.462953][T12140]  ip6_output+0x25e/0x880
[  645.467308][T12140]  ? ip6_finish_output+0x1f0/0x1f0
20:00:47 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00')
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0)
epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0)
sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, r1, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0xb, @multicast1}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}]}, 0x24}}, 0x0)

[  645.472453][T12140]  ? __ip6_finish_output+0xaa0/0xaa0
[  645.477761][T12140]  ? ip6_make_skb+0x370/0x570
[  645.482459][T12140]  ? ip_reply_glue_bits+0xc0/0xc0
[  645.487523][T12140]  ip6_local_out+0xbb/0x1b0
[  645.487541][T12140]  ip6_send_skb+0xbb/0x350
[  645.487566][T12140]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  645.501973][T12140]  ? ip6_forward_finish+0x570/0x570
[  645.507196][T12140]  udpv6_sendmsg+0x22f3/0x2b30
[  645.511984][T12140]  ? __kasan_check_write+0x14/0x20
[  645.517121][T12140]  ? ip_reply_glue_bits+0xc0/0xc0
[  645.522171][T12140]  ? udp_v6_get_port+0x6b0/0x6b0
[  645.522187][T12140]  ? __kasan_check_read+0x11/0x20
[  645.522209][T12140]  ? mark_lock+0xc2/0x1220
[  645.532173][T12140]  ? __kasan_check_read+0x11/0x20
[  645.532188][T12140]  ? mark_lock+0xc2/0x1220
[  645.532202][T12140]  ? __kasan_check_read+0x11/0x20
[  645.532224][T12140]  ? ___might_sleep+0x163/0x2c0
[  645.532245][T12140]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  645.532270][T12140]  ? aa_sk_perm+0x346/0xb00
[  645.541723][T12140]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  645.541750][T12140]  inet6_sendmsg+0x9e/0xe0
[  645.541774][T12140]  ? inet6_sendmsg+0x9e/0xe0
[  645.541788][T12140]  ? inet6_ioctl+0x1c0/0x1c0
[  645.541809][T12140]  sock_sendmsg+0xd7/0x130
[  645.551242][T12140]  ____sys_sendmsg+0x358/0x880
[  645.551263][T12140]  ? kernel_sendmsg+0x50/0x50
[  645.551286][T12140]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  645.571787][T12140]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  645.571808][T12140]  ? find_held_lock+0x35/0x130
[  645.599251][T12140]  ___sys_sendmsg+0x100/0x170
[  645.599268][T12140]  ? sendmsg_copy_msghdr+0x70/0x70
[  645.599284][T12140]  ? __kasan_check_read+0x11/0x20
[  645.599301][T12140]  ? __might_fault+0x12b/0x1e0
[  645.599317][T12140]  ? find_held_lock+0x35/0x130
[  645.599337][T12140]  ? __might_fault+0x12b/0x1e0
[  645.635148][T12140]  ? do_dup2+0x4f0/0x4f0
[  645.635173][T12140]  ? lock_downgrade+0x920/0x920
[  645.653787][T12140]  ? ___might_sleep+0x163/0x2c0
[  645.653808][T12140]  __sys_sendmmsg+0x1bf/0x4d0
[  645.663336][T12140]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  645.668493][T12140]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  645.674749][T12140]  ? fput_many+0x12c/0x1a0
[  645.674766][T12140]  ? fput+0x1b/0x20
[  645.674780][T12140]  ? ksys_write+0x1cf/0x290
[  645.674803][T12140]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  645.683021][T12140]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  645.683037][T12140]  ? do_syscall_64+0x26/0x790
[  645.683057][T12140]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  645.692975][T12140]  ? do_syscall_64+0x26/0x790
[  645.692996][T12140]  __x64_sys_sendmmsg+0x9d/0x100
[  645.693016][T12140]  do_syscall_64+0xfa/0x790
[  645.693035][T12140]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  645.703156][T12140] RIP: 0033:0x45a919
[  645.713867][T12140] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  645.713875][T12140] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  645.713889][T12140] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  645.713896][T12140] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  645.713910][T12140] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  645.723324][T12140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  645.723334][T12140] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  648.368665][    C0] net_ratelimit: 16 callbacks suppressed
[  648.368671][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  648.380541][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  649.168692][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  649.174551][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  649.888713][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  649.894552][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  649.900536][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  649.906432][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  650.368700][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  650.375350][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:55 executing program 5:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x8)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000002c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000340)='./file0/file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0)
syz_open_dev$mice(0x0, 0x0, 0x0)
r1 = socket$caif_stream(0x25, 0x1, 0x3)
r2 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18)
setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4)
r3 = socket(0x100000000011, 0x2, 0x0)
bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000540)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c0042002800010000000000000000000000000000000000affe00000000000000000000ff01000000000000"], 0x58}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r6, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x0, r6, 0x12}, 0x10)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0)
ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0)
r7 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
r8 = openat$cgroup_procs(r7, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r8, &(0x7f0000000300), 0x12)
r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0)
accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0)
preadv(r9, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0)
io_setup(0x0, 0x0)
socket$packet(0x11, 0x2, 0x300)
semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}})
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x84, 0x4000000000000800, 0x1}, 0x3c)

20:00:55 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
dup2(r1, r2)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:00:55 executing program 2:
pipe(&(0x7f0000000680))
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d)
r1 = getpgrp(0x0)
capget(&(0x7f0000000000)={0x0, r1}, 0x0)
r2 = getpgid(0x0)
memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5)
syz_open_dev$sndseq(0x0, 0x0, 0x0)
ppoll(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040))
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
pipe(0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee1", @ANYBLOB, @ANYRES32=0x0], 0x6, 0x1)
r4 = socket(0xa, 0x3, 0x8)
syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, 0x0)
sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0)
r5 = gettid()
waitid(0x0, r5, &(0x7f0000000040), 0x0, &(0x7f0000000480))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$key(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYRES32], 0x4}}, 0x906851376542d00c)
memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
r7 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r7)
writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x24}], 0x2)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0)
kcmp(r7, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
ptrace$setopts(0x4206, r7, 0x0, 0x0)
syz_open_dev$dmmidi(0x0, 0x5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00'}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={<r8=>0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0, <r9=>0x0}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, r9}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc)
open(0x0, 0xe279a88a3b20cda9, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r10 = socket$inet(0x2, 0x4000000000000001, 0x0)
fcntl$setpipe(r10, 0x407, 0xfffffffffffffffe)
bind$inet(r10, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r10, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10)
r11 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x0)
r12 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r12, 0x0, 0x0, 0x200007fd, 0x0, 0x0)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000240)={0x20, 0x0, 0xffffffffffffffff, {0x0, 0x4}}, 0xffffffffffffffb2)
ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000280)=""/11)
r13 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0)
open(0x0, 0x0, 0x0)
getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000300))
pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003)
ioctl$LOOP_CHANGE_FD(r11, 0x4c00, r13)
sendfile(r10, r11, 0x0, 0x102000004)

20:00:55 executing program 4:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x1, 0x400000000000006}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x2, r1, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r3, 0x0)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r5=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r5)
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r7)
r8 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r9=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r9)
r10 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
fsetxattr$system_posix_acl(r10, &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x4}, [{0x2, 0xc, r3}], {0x4, 0x1}, [{0x8, 0x1, r5}, {0x8, 0x3, r7}, {0x8, 0x5, r9}], {0x10, 0x1}, {0x20, 0xfae7f96afd2b918}}, 0x44, 0x1)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003000000bfa30000000008000703000000feffe6774389ed080c6cc8c0606cff7a0af0fff8ffffff79a4f0ff00000000e3b1c3027388baa4d9d210a8af5b6b9a3b0f76ffffffff2d6405000000000065040400010000000404000001067d60b7030008000000006a0a00fe00000000850000000d000000b7aee740e23c8be123f41a9c205e470c9c6af45b26e18678d7260bcc7bd075141996e89c20d149048f91dfb1fec3683c9e356c26706a8a6b611cd87e8e5b9697ef6067596cb34977b7495b0680bef663979a3a3efb619aae1ac74b17300654"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r0}, 0x78)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0xa}, 0x1b301113ef96cf7e, 0x2, 0x0, 0x0, 0x3, 0x8dc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0)
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0)
r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r12 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
fsetxattr$security_capability(r12, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000300)=@v2={0x2000000, [{0x5, 0x2}, {0x3, 0x80}]}, 0x14, 0x3)
ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0)
write$cgroup_subtree(r11, &(0x7f0000000380)=ANY=[@ANYBLOB="e37397d776ebb77df46b80f7ead5a5d6fd4003000000ceef063f7b4cc8ac3babdbef581068bac20c7ae0023fb0a8f24dd5badd60729eaec309937c68bc9218135b87ac4e12b50e00000000000011d68f6c7ec90af9572f8aad0a6455f645c2e961bd2bcb03e92ac9758e5f99498d51741de9302dcbaf80aeba196b883127938359ae178f8fcece546360dd388dffdfb5789af525080000004cbd6cbe07e9a774a129d96ac791d5fb1694df557ff45798d3a09014c867e754b1c1568cd62a322cf5e8ac11ace7b6a50349c5defa2e3008c5a97c9df238e7bb70bea00d92d170ecc138b82db9f3"], 0x39)
r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$cgroup_int(r13, &(0x7f0000000500)='cgroup.clone_children\x00', 0x2, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0)

20:00:55 executing program 3 (fault-call:2 fault-nth:18):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:55 executing program 0:
r0 = socket(0x2, 0x1, 0x0)
r1 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x60000000})
epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0)
connect$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=@fragment={0x5e, 0x0, 0x2e, 0x0, 0x0, 0x15, 0x65}, 0x8)

[  653.964038][T12179] FAULT_INJECTION: forcing a failure.
[  653.964038][T12179] name failslab, interval 1, probability 0, space 0, times 0
[  654.039762][T12179] CPU: 0 PID: 12179 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  654.049808][T12179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  654.049816][T12179] Call Trace:
[  654.049840][T12179]  dump_stack+0x197/0x210
[  654.049865][T12179]  should_fail.cold+0xa/0x10
[  654.049883][T12179]  ? setup_fault_attr+0x220/0x220
[  654.049903][T12179]  ? ___might_sleep+0x163/0x2c0
[  654.049929][T12179]  __should_failslab+0x121/0x190
[  654.049949][T12179]  should_failslab+0x9/0x14
[  654.068026][T12179]  kmem_cache_alloc_node+0x268/0x740
[  654.068047][T12179]  ? __dev_queue_xmit+0x173f/0x35c0
[  654.068063][T12179]  ? trace_hardirqs_on+0x67/0x240
[  654.068084][T12179]  ? __dev_queue_xmit+0x173f/0x35c0
[  654.077957][T12179]  __alloc_skb+0xd5/0x5e0
[  654.077979][T12179]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  654.078003][T12179]  alloc_skb_with_frags+0x93/0x590
[  654.087786][T12179]  ? find_held_lock+0x35/0x130
[  654.087814][T12179]  sock_alloc_send_pskb+0x7ad/0x920
[  654.087840][T12179]  ? sock_wmalloc+0x120/0x120
[  654.087859][T12179]  ? __local_bh_enable_ip+0x15a/0x270
[  654.097937][T12179]  ? ip6_finish_output2+0x1106/0x25c0
[  654.097955][T12179]  ? ip6_mtu+0x2e6/0x450
[  654.097970][T12179]  ? find_held_lock+0x35/0x130
[  654.097990][T12179]  sock_alloc_send_skb+0x32/0x40
[  654.098010][T12179]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  654.113414][T12179]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.113440][T12179]  ? ip6_setup_cork+0x1920/0x1920
[  654.113456][T12179]  ? ip6_flush_pending_frames+0xd0/0xd0
[  654.113471][T12179]  ? __kasan_check_read+0x11/0x20
[  654.113491][T12179]  ip6_make_skb+0x32f/0x570
[  654.123339][T12179]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.123358][T12179]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.123380][T12179]  ? ip6_push_pending_frames+0xf0/0xf0
[  654.123403][T12179]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  654.123421][T12179]  ? ip6_forward_finish+0x570/0x570
[  654.123441][T12179]  ? rcu_read_lock_held+0x9c/0xb0
[  654.133555][T12179]  udpv6_sendmsg+0x22a1/0x2b30
[  654.133578][T12179]  ? __kasan_check_write+0x14/0x20
[  654.133594][T12179]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.133619][T12179]  ? udp_v6_get_port+0x6b0/0x6b0
[  654.133632][T12179]  ? __kasan_check_read+0x11/0x20
[  654.133647][T12179]  ? mark_lock+0xc2/0x1220
[  654.143615][T12179]  ? __kasan_check_read+0x11/0x20
[  654.143632][T12179]  ? mark_lock+0xc2/0x1220
[  654.143646][T12179]  ? __kasan_check_read+0x11/0x20
[  654.143672][T12179]  ? ___might_sleep+0x163/0x2c0
[  654.154467][T12179]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  654.154487][T12179]  ? aa_sk_perm+0x346/0xb00
20:00:56 executing program 0:
r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x4e21, 0x0, 'lblc\x00', 0xd, 0x200, 0x2d}, 0x2c)
sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

[  654.154517][T12179]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  654.154542][T12179]  inet6_sendmsg+0x9e/0xe0
[  654.163520][T12179]  ? inet6_sendmsg+0x9e/0xe0
[  654.163539][T12179]  ? inet6_ioctl+0x1c0/0x1c0
[  654.163555][T12179]  sock_sendmsg+0xd7/0x130
[  654.163576][T12179]  ____sys_sendmsg+0x358/0x880
[  654.174232][T12179]  ? kernel_sendmsg+0x50/0x50
[  654.174252][T12179]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  654.174268][T12179]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  654.174287][T12179]  ? find_held_lock+0x35/0x130
[  654.184315][T12179]  ___sys_sendmsg+0x100/0x170
[  654.184335][T12179]  ? sendmsg_copy_msghdr+0x70/0x70
[  654.184351][T12179]  ? __kasan_check_read+0x11/0x20
[  654.184372][T12179]  ? __might_fault+0x12b/0x1e0
[  654.220526][T12179]  ? find_held_lock+0x35/0x130
[  654.220543][T12179]  ? __might_fault+0x12b/0x1e0
[  654.220560][T12179]  ? do_dup2+0x4f0/0x4f0
[  654.220579][T12179]  ? lock_downgrade+0x920/0x920
[  654.230798][T12179]  ? ___might_sleep+0x163/0x2c0
[  654.230819][T12179]  __sys_sendmmsg+0x1bf/0x4d0
[  654.230842][T12179]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  654.230877][T12179]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  654.399490][T12179]  ? fput_many+0x12c/0x1a0
[  654.403916][T12179]  ? fput+0x1b/0x20
[  654.408411][T12179]  ? ksys_write+0x1cf/0x290
[  654.412919][T12179]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  654.418479][T12179]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  654.423930][T12179]  ? do_syscall_64+0x26/0x790
[  654.428778][T12179]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  654.434831][T12179]  ? do_syscall_64+0x26/0x790
[  654.439512][T12179]  __x64_sys_sendmmsg+0x9d/0x100
[  654.444440][T12179]  do_syscall_64+0xfa/0x790
[  654.448944][T12179]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  654.454824][T12179] RIP: 0033:0x45a919
[  654.458727][T12179] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  654.478320][T12179] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  654.486734][T12179] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  654.494709][T12179] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  654.502668][T12179] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  654.510642][T12179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  654.518613][T12179] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  654.526886][    C0] net_ratelimit: 14 callbacks suppressed
[  654.526898][    C0] protocol 88fb is buggy, dev hsr_slave_0
20:00:56 executing program 4:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10)
r1 = socket$inet(0xa, 0x801, 0x84)
sendto$inet(r1, 0x0, 0x0, 0x4000, 0x0, 0x0)
accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0xc0000)
socket$inet(0xa, 0x801, 0x0)
listen(0xffffffffffffffff, 0x100000001)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000240)='veIi\x7f\x15', 0xffffffffffffff2e)
r2 = socket$inet(0xa, 0x801, 0x84)
listen(r2, 0x100000001)
prctl$PR_GET_SECUREBITS(0x1b)
unshare(0x8020000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4)
epoll_create(0x8001)
r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00')
setns(r3, 0x0)
clone(0x10062101, 0x0, 0x0, 0x0, 0x0)
sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="18adb55b658ff0fbe34010dfc79052ce84ab5ab8daab379617b8d88c290cad35da97c0578e5389794c5d5d56d4", 0x2d, 0x0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)

[  654.538570][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  654.544455][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  654.550308][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  654.556781][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  654.562635][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:00:56 executing program 3 (fault-call:2 fault-nth:19):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  654.608606][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  654.614435][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  654.733300][T12198] FAULT_INJECTION: forcing a failure.
[  654.733300][T12198] name failslab, interval 1, probability 0, space 0, times 0
[  654.768863][T12198] CPU: 1 PID: 12198 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  654.778897][T12198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  654.789082][T12198] Call Trace:
[  654.792402][T12198]  dump_stack+0x197/0x210
[  654.796752][T12198]  should_fail.cold+0xa/0x10
[  654.801367][T12198]  ? setup_fault_attr+0x220/0x220
[  654.806423][T12198]  ? ___might_sleep+0x163/0x2c0
[  654.811301][T12198]  __should_failslab+0x121/0x190
[  654.816268][T12198]  should_failslab+0x9/0x14
[  654.820797][T12198]  kmem_cache_alloc_node_trace+0x274/0x750
[  654.826630][T12198]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  654.832684][T12198]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  654.838490][T12198]  __kmalloc_node_track_caller+0x3d/0x70
[  654.844145][T12198]  __kmalloc_reserve.isra.0+0x40/0xf0
[  654.849529][T12198]  __alloc_skb+0x10b/0x5e0
[  654.853939][T12198]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  654.859495][T12198]  alloc_skb_with_frags+0x93/0x590
[  654.864616][T12198]  ? find_held_lock+0x35/0x130
[  654.869513][T12198]  sock_alloc_send_pskb+0x7ad/0x920
[  654.874732][T12198]  ? sock_wmalloc+0x120/0x120
[  654.879410][T12198]  ? __local_bh_enable_ip+0x15a/0x270
[  654.884795][T12198]  ? ip6_finish_output2+0x1106/0x25c0
[  654.890167][T12198]  ? ip6_mtu+0x2e6/0x450
[  654.894412][T12198]  ? find_held_lock+0x35/0x130
[  654.899199][T12198]  sock_alloc_send_skb+0x32/0x40
[  654.904174][T12198]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  654.909910][T12198]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.914952][T12198]  ? ip6_setup_cork+0x1920/0x1920
[  654.920069][T12198]  ? ip6_flush_pending_frames+0xd0/0xd0
[  654.925617][T12198]  ? __kasan_check_read+0x11/0x20
[  654.930664][T12198]  ip6_make_skb+0x32f/0x570
[  654.935164][T12198]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.940208][T12198]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.945236][T12198]  ? ip6_push_pending_frames+0xf0/0xf0
[  654.950710][T12198]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  654.956245][T12198]  ? ip6_forward_finish+0x570/0x570
[  654.961438][T12198]  ? rcu_read_lock_held+0x9c/0xb0
[  654.966469][T12198]  udpv6_sendmsg+0x22a1/0x2b30
[  654.971239][T12198]  ? __kasan_check_write+0x14/0x20
[  654.976351][T12198]  ? ip_reply_glue_bits+0xc0/0xc0
[  654.981406][T12198]  ? udp_v6_get_port+0x6b0/0x6b0
[  654.986694][T12198]  ? __kasan_check_read+0x11/0x20
[  654.991706][T12198]  ? mark_lock+0xc2/0x1220
[  654.996110][T12198]  ? __kasan_check_read+0x11/0x20
[  655.001141][T12198]  ? mark_lock+0xc2/0x1220
[  655.005557][T12198]  ? __kasan_check_read+0x11/0x20
[  655.010598][T12198]  ? ___might_sleep+0x163/0x2c0
[  655.015442][T12198]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  655.021073][T12198]  ? aa_sk_perm+0x346/0xb00
[  655.025597][T12198]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  655.031152][T12198]  inet6_sendmsg+0x9e/0xe0
[  655.035575][T12198]  ? inet6_sendmsg+0x9e/0xe0
[  655.040207][T12198]  ? inet6_ioctl+0x1c0/0x1c0
[  655.044805][T12198]  sock_sendmsg+0xd7/0x130
[  655.049220][T12198]  ____sys_sendmsg+0x358/0x880
[  655.053982][T12198]  ? kernel_sendmsg+0x50/0x50
[  655.058654][T12198]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  655.064212][T12198]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  655.070196][T12198]  ? find_held_lock+0x35/0x130
[  655.074969][T12198]  ___sys_sendmsg+0x100/0x170
[  655.079649][T12198]  ? sendmsg_copy_msghdr+0x70/0x70
[  655.084767][T12198]  ? __kasan_check_read+0x11/0x20
[  655.089787][T12198]  ? __might_fault+0x12b/0x1e0
[  655.094538][T12198]  ? find_held_lock+0x35/0x130
[  655.099300][T12198]  ? __might_fault+0x12b/0x1e0
[  655.104107][T12198]  ? do_dup2+0x4f0/0x4f0
[  655.108376][T12198]  ? lock_downgrade+0x920/0x920
[  655.113289][T12198]  ? ___might_sleep+0x163/0x2c0
[  655.118148][T12198]  __sys_sendmmsg+0x1bf/0x4d0
[  655.122846][T12198]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  655.127916][T12198]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  655.134172][T12198]  ? fput_many+0x12c/0x1a0
[  655.138591][T12198]  ? fput+0x1b/0x20
[  655.142415][T12198]  ? ksys_write+0x1cf/0x290
[  655.146928][T12198]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  655.152403][T12198]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  655.157871][T12198]  ? do_syscall_64+0x26/0x790
[  655.162556][T12198]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  655.168623][T12198]  ? do_syscall_64+0x26/0x790
[  655.173309][T12198]  __x64_sys_sendmmsg+0x9d/0x100
[  655.178244][T12198]  do_syscall_64+0xfa/0x790
[  655.182754][T12198]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  655.188644][T12198] RIP: 0033:0x45a919
[  655.192526][T12198] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  655.212181][T12198] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  655.220601][T12198] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
20:00:57 executing program 4:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0)
fchdir(0xffffffffffffffff)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
socket$unix(0x1, 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0)

[  655.228673][T12198] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  655.236663][T12198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  655.244636][T12198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  655.252609][T12198] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:00:57 executing program 3 (fault-call:2 fault-nth:20):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:00:57 executing program 0:
socketpair(0x1, 0x1, 0x0, &(0x7f0000000740))
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80000, 0x0)
socket$kcm(0xa, 0x2, 0x11)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)='cpuset.effective_cpus\x00')
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000001c0)={0x10000000}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
gettid()
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000000), 0x1fe)
r1 = gettid()
perf_event_open(0x0, r1, 0x7, 0xffffffffffffffff, 0x4)
write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
gettid()
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r2, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
getpid()
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r3 = socket$kcm(0xa, 0x922000000003, 0x11)
setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4)
sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002100004003000000c0", 0x31}], 0x1}, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'})
ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x30}, {0x6}]})
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r4 = socket$kcm(0x2b, 0x1, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x00\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1e\xbc\x91L\xa0\xda/Q\x19\xe15\x84\x8f\xea\x98\xc6\xe3WZ\x96\xce\x05\xfc\x95\xd9\x88/|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'}=\xfc\xa4\x86\xff\r\xedmd1\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0)
setsockopt$sock_attach_bpf(r4, 0x6, 0x8, &(0x7f0000000000)=r5, 0x1fe)
socket$kcm(0x2b, 0x1, 0x0)

[  655.408592][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  655.414888][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  655.449439][T12215] FAULT_INJECTION: forcing a failure.
[  655.449439][T12215] name failslab, interval 1, probability 0, space 0, times 0
[  655.462653][T12215] CPU: 1 PID: 12215 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  655.472561][T12215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  655.482627][T12215] Call Trace:
[  655.485944][T12215]  dump_stack+0x197/0x210
[  655.490391][T12215]  should_fail.cold+0xa/0x10
[  655.495009][T12215]  ? setup_fault_attr+0x220/0x220
[  655.500104][T12215]  ? ___might_sleep+0x163/0x2c0
[  655.505132][T12215]  __should_failslab+0x121/0x190
[  655.510188][T12215]  should_failslab+0x9/0x14
[  655.514724][T12215]  kmem_cache_alloc_node+0x268/0x740
[  655.520045][T12215]  ? __dev_queue_xmit+0x173f/0x35c0
[  655.525386][T12215]  ? trace_hardirqs_on+0x67/0x240
[  655.530525][T12215]  ? __dev_queue_xmit+0x173f/0x35c0
[  655.536193][T12215]  __alloc_skb+0xd5/0x5e0
[  655.541947][T12215]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  655.547521][T12215]  alloc_skb_with_frags+0x93/0x590
[  655.552660][T12215]  ? find_held_lock+0x35/0x130
[  655.557448][T12215]  sock_alloc_send_pskb+0x7ad/0x920
[  655.562767][T12215]  ? sock_wmalloc+0x120/0x120
[  655.567458][T12215]  ? __local_bh_enable_ip+0x15a/0x270
[  655.572849][T12215]  ? ip6_finish_output2+0x1106/0x25c0
[  655.578236][T12215]  ? ip6_mtu+0x2e6/0x450
[  655.582494][T12215]  ? find_held_lock+0x35/0x130
[  655.587281][T12215]  sock_alloc_send_skb+0x32/0x40
[  655.592236][T12215]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  655.597978][T12215]  ? ip_reply_glue_bits+0xc0/0xc0
[  655.603027][T12215]  ? ip6_setup_cork+0x1920/0x1920
[  655.608068][T12215]  ? ip6_flush_pending_frames+0xd0/0xd0
[  655.613627][T12215]  ? __kasan_check_read+0x11/0x20
[  655.618694][T12215]  ip6_make_skb+0x32f/0x570
[  655.623208][T12215]  ? ip_reply_glue_bits+0xc0/0xc0
[  655.628263][T12215]  ? ip_reply_glue_bits+0xc0/0xc0
[  655.633316][T12215]  ? ip6_push_pending_frames+0xf0/0xf0
[  655.638805][T12215]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  655.644390][T12215]  ? ip6_forward_finish+0x570/0x570
[  655.649604][T12215]  ? rcu_read_lock_held+0x9c/0xb0
[  655.654661][T12215]  udpv6_sendmsg+0x22a1/0x2b30
[  655.659484][T12215]  ? __kasan_check_write+0x14/0x20
[  655.664619][T12215]  ? ip_reply_glue_bits+0xc0/0xc0
[  655.669675][T12215]  ? udp_v6_get_port+0x6b0/0x6b0
[  655.674631][T12215]  ? __kasan_check_read+0x11/0x20
[  655.679767][T12215]  ? mark_lock+0xc2/0x1220
[  655.684219][T12215]  ? __kasan_check_read+0x11/0x20
[  655.689264][T12215]  ? mark_lock+0xc2/0x1220
[  655.693699][T12215]  ? __kasan_check_read+0x11/0x20
[  655.698750][T12215]  ? ___might_sleep+0x163/0x2c0
[  655.703629][T12215]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  655.709275][T12215]  ? aa_sk_perm+0x346/0xb00
[  655.713815][T12215]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  655.719545][T12215]  inet6_sendmsg+0x9e/0xe0
[  655.723988][T12215]  ? inet6_sendmsg+0x9e/0xe0
[  655.728611][T12215]  ? inet6_ioctl+0x1c0/0x1c0
[  655.733220][T12215]  sock_sendmsg+0xd7/0x130
[  655.737644][T12215]  ____sys_sendmsg+0x358/0x880
[  655.742401][T12215]  ? kernel_sendmsg+0x50/0x50
[  655.747081][T12215]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  655.752645][T12215]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  655.758726][T12215]  ? find_held_lock+0x35/0x130
[  655.763617][T12215]  ___sys_sendmsg+0x100/0x170
[  655.768295][T12215]  ? sendmsg_copy_msghdr+0x70/0x70
[  655.773426][T12215]  ? __kasan_check_read+0x11/0x20
[  655.778452][T12215]  ? __might_fault+0x12b/0x1e0
[  655.783221][T12215]  ? find_held_lock+0x35/0x130
[  655.787987][T12215]  ? __might_fault+0x12b/0x1e0
[  655.792742][T12215]  ? do_dup2+0x4f0/0x4f0
[  655.796992][T12215]  ? lock_downgrade+0x920/0x920
[  655.801867][T12215]  ? ___might_sleep+0x163/0x2c0
[  655.806719][T12215]  __sys_sendmmsg+0x1bf/0x4d0
[  655.811403][T12215]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  655.816452][T12215]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  655.822682][T12215]  ? fput_many+0x12c/0x1a0
[  655.827218][T12215]  ? fput+0x1b/0x20
[  655.831027][T12215]  ? ksys_write+0x1cf/0x290
[  655.835720][T12215]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  655.841212][T12215]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  655.846683][T12215]  ? do_syscall_64+0x26/0x790
[  655.851366][T12215]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  655.857435][T12215]  ? do_syscall_64+0x26/0x790
[  655.862123][T12215]  __x64_sys_sendmmsg+0x9d/0x100
[  655.867065][T12215]  do_syscall_64+0xfa/0x790
[  655.871573][T12215]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  655.877466][T12215] RIP: 0033:0x45a919
[  655.881364][T12215] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  655.900977][T12215] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  655.909399][T12215] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  655.917455][T12215] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  655.925418][T12215] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  655.933451][T12215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  655.941429][T12215] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  659.568692][    C0] net_ratelimit: 18 callbacks suppressed
[  659.575173][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  659.581227][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  660.768611][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  660.774439][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  660.780326][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  660.786132][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  660.791997][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  660.797791][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  660.858647][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  660.864451][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:01:05 executing program 5:
r0 = open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x0)
ftruncate(r0, 0x0)

20:01:05 executing program 2:
r0 = socket(0x10, 0x3, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
close(r1)
close(r2)
pipe(&(0x7f0000000380)={<r3=>0xffffffffffffffff})
splice(r0, 0x0, r2, 0x0, 0x2, 0x0)
read$char_usb(r3, &(0x7f0000000040)=""/14, 0xe)
ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0xc2)
write(r0, &(0x7f0000000300)="2400000012005f3414f9f407000973ca2db90fb88e67003e787400050000000000000000", 0x24)

20:01:05 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x10)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500197f09004b0101048c590188ffffcf5d060000427a000000033057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028215bffff9b2264520405a3000000", 0x48}], 0x1)
recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@x25={0x9, @null='               \x00'}, 0x80)

20:01:05 executing program 3 (fault-call:2 fault-nth:21):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:05 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, 0x0, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006926ed0c00"}, 0xd8)
socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0)
ftruncate(r1, 0x80006)
sendfile(r0, r1, 0x0, 0x8000fffffffe)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, 0x0)
dup3(r2, r0, 0x0)

20:01:05 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:01:05 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10)
r1 = socket$inet6(0xa, 0x3, 0x7)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x3c}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x1}}, 0xe8)
write(0xffffffffffffffff, &(0x7f0000000540)="dc8bc724d06a867d", 0x8)
sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0)

20:01:05 executing program 0:

[  663.692872][T12236] FAULT_INJECTION: forcing a failure.
[  663.692872][T12236] name failslab, interval 1, probability 0, space 0, times 0
[  663.705609][T12236] CPU: 0 PID: 12236 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  663.715512][T12236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  663.725579][T12236] Call Trace:
[  663.728892][T12236]  dump_stack+0x197/0x210
[  663.733253][T12236]  should_fail.cold+0xa/0x10
[  663.737948][T12236]  ? is_bpf_text_address+0xac/0x160
[  663.743193][T12236]  ? setup_fault_attr+0x220/0x220
[  663.748415][T12236]  __should_failslab+0x121/0x190
[  663.753385][T12236]  should_failslab+0x9/0x14
[  663.753404][T12236]  kmem_cache_alloc+0x47/0x710
[  663.753424][T12236]  ? lock_acquire+0x190/0x410
[  663.753447][T12236]  ? net_tx_action+0xd30/0xd30
[  663.762687][T12236]  skb_clone+0x154/0x3d0
[  663.762707][T12236]  dev_queue_xmit_nit+0x3a1/0xaa0
[  663.762733][T12236]  dev_hard_start_xmit+0xbb/0x9b0
[  663.762754][T12236]  ? validate_xmit_skb_list+0xfc/0x150
[  663.762778][T12236]  sch_direct_xmit+0x372/0xd30
[  663.762802][T12236]  ? dev_watchdog+0xca0/0xca0
[  663.801374][T12236]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  663.806940][T12236]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  663.812925][T12236]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  663.819166][T12236]  ? sfb_dequeue+0x421/0x4d0
[  663.823752][T12236]  __qdisc_run+0x4bf/0x1770
[  663.828253][T12236]  __dev_queue_xmit+0x1650/0x35c0
[  663.833273][T12236]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  663.838560][T12236]  ? mark_held_locks+0xf0/0xf0
[  663.843310][T12236]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  663.849541][T12236]  ? debug_smp_processor_id+0x33/0x18a
[  663.854989][T12236]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  663.861146][T12236]  ? rcu_read_lock_held_common+0xbd/0x130
[  663.866863][T12236]  dev_queue_xmit+0x18/0x20
[  663.871360][T12236]  ? dev_queue_xmit+0x18/0x20
[  663.876022][T12236]  neigh_direct_output+0x16/0x20
[  663.881044][T12236]  ip6_finish_output2+0x109a/0x25c0
[  663.886246][T12236]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  663.891775][T12236]  ? lock_downgrade+0x920/0x920
[  663.896619][T12236]  ? netif_rx_ni+0x670/0x670
[  663.901211][T12236]  ? __kasan_check_read+0x11/0x20
[  663.906223][T12236]  __ip6_finish_output+0x444/0xaa0
[  663.911318][T12236]  ? __ip6_finish_output+0x444/0xaa0
[  663.916864][T12236]  ip6_finish_output+0x38/0x1f0
[  663.922054][T12236]  ip6_output+0x25e/0x880
[  663.926370][T12236]  ? ip6_finish_output+0x1f0/0x1f0
[  663.931481][T12236]  ? __ip6_finish_output+0xaa0/0xaa0
[  663.936749][T12236]  ? ip6_make_skb+0x370/0x570
[  663.941533][T12236]  ? ip_reply_glue_bits+0xc0/0xc0
[  663.946576][T12236]  ip6_local_out+0xbb/0x1b0
[  663.951081][T12236]  ip6_send_skb+0xbb/0x350
[  663.955522][T12236]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  663.960989][T12236]  ? ip6_forward_finish+0x570/0x570
[  663.966187][T12236]  udpv6_sendmsg+0x22f3/0x2b30
[  663.970950][T12236]  ? __kasan_check_write+0x14/0x20
[  663.976049][T12236]  ? ip_reply_glue_bits+0xc0/0xc0
[  663.981076][T12236]  ? udp_v6_get_port+0x6b0/0x6b0
[  663.986010][T12236]  ? __kasan_check_read+0x11/0x20
[  663.991020][T12236]  ? mark_lock+0xc2/0x1220
[  663.995437][T12236]  ? __kasan_check_read+0x11/0x20
[  664.000445][T12236]  ? mark_lock+0xc2/0x1220
[  664.004848][T12236]  ? __kasan_check_read+0x11/0x20
[  664.009866][T12236]  ? ___might_sleep+0x163/0x2c0
[  664.014713][T12236]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  664.020332][T12236]  ? aa_sk_perm+0x346/0xb00
[  664.024835][T12236]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  664.030394][T12236]  inet6_sendmsg+0x9e/0xe0
[  664.034797][T12236]  ? inet6_sendmsg+0x9e/0xe0
[  664.039373][T12236]  ? inet6_ioctl+0x1c0/0x1c0
[  664.043948][T12236]  sock_sendmsg+0xd7/0x130
[  664.048358][T12236]  ____sys_sendmsg+0x358/0x880
[  664.053111][T12236]  ? kernel_sendmsg+0x50/0x50
[  664.057786][T12236]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  664.063329][T12236]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  664.069302][T12236]  ? find_held_lock+0x35/0x130
[  664.074059][T12236]  ___sys_sendmsg+0x100/0x170
[  664.081332][T12236]  ? sendmsg_copy_msghdr+0x70/0x70
[  664.086444][T12236]  ? __kasan_check_read+0x11/0x20
[  664.091456][T12236]  ? __might_fault+0x12b/0x1e0
[  664.096203][T12236]  ? find_held_lock+0x35/0x130
[  664.100956][T12236]  ? __might_fault+0x12b/0x1e0
[  664.105712][T12236]  ? do_dup2+0x4f0/0x4f0
[  664.110039][T12236]  ? lock_downgrade+0x920/0x920
[  664.114895][T12236]  ? ___might_sleep+0x163/0x2c0
[  664.119739][T12236]  __sys_sendmmsg+0x1bf/0x4d0
[  664.124412][T12236]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  664.129439][T12236]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  664.135667][T12236]  ? fput_many+0x12c/0x1a0
[  664.140078][T12236]  ? fput+0x1b/0x20
[  664.143874][T12236]  ? ksys_write+0x1cf/0x290
[  664.148394][T12236]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  664.153839][T12236]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  664.159305][T12236]  ? do_syscall_64+0x26/0x790
[  664.163971][T12236]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  664.170030][T12236]  ? do_syscall_64+0x26/0x790
[  664.174710][T12236]  __x64_sys_sendmmsg+0x9d/0x100
[  664.180176][T12236]  do_syscall_64+0xfa/0x790
[  664.184669][T12236]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  664.190561][T12236] RIP: 0033:0x45a919
[  664.194454][T12236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  664.214044][T12236] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  664.222462][T12236] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  664.230421][T12236] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  664.238390][T12236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  664.246347][T12236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  664.254315][T12236] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:06 executing program 0:

20:01:06 executing program 0:

20:01:06 executing program 4:

[  664.361061][T12252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'.
20:01:06 executing program 2:

[  664.928656][    C0] net_ratelimit: 12 callbacks suppressed
[  664.928662][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  664.940161][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  664.946047][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  664.952047][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  664.957946][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  664.963825][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  665.018643][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  665.024859][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  666.288648][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  666.294505][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  670.448645][    C0] net_ratelimit: 18 callbacks suppressed
[  670.448651][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  670.460541][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  671.168636][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  671.174449][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  671.180302][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  671.186433][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  671.192256][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  671.198017][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  671.248686][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  671.254671][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:01:14 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0)
rmdir(0x0)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f00000000c0)='syz0\x00')
ioctl$TCSETS(r4, 0x40045431, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x100000800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, 0x0, 0x0, 0x0)

20:01:14 executing program 3 (fault-call:2 fault-nth:22):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:14 executing program 0:

20:01:14 executing program 4:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0)
r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000ac0)=""/4096, 0x1031)

20:01:14 executing program 2:
r0 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r1)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="726177000000000000000000003053000000000000000000000000000000000009000000030000003802000010010000a0010000000000000000000010010000a0010000a0010000a0010000a0010000a001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000005800686173686c696d6974000000000000000000000000000000000000000001670000001080000000000010000000000000000000001000ff0f0000000000000000000000040000ff0f0000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000900000000000000000000000000000000000000000002000545241434500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)
sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0x0)

20:01:14 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  672.012716][T12271] x_tables: duplicate underflow at hook 3
[  672.025778][T12275] x_tables: duplicate underflow at hook 3
20:01:14 executing program 2:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$GIO_UNIMAP(r0, 0x4b40, 0x0)

[  672.062918][T12277] FAULT_INJECTION: forcing a failure.
[  672.062918][T12277] name failslab, interval 1, probability 0, space 0, times 0
20:01:14 executing program 4:
creat(&(0x7f0000000280)='./file0\x00', 0x0)
r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0)
close(r0)

[  672.106054][T12277] CPU: 1 PID: 12277 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  672.116264][T12277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  672.126933][T12277] Call Trace:
[  672.130263][T12277]  dump_stack+0x197/0x210
[  672.134614][T12277]  should_fail.cold+0xa/0x10
[  672.139217][T12277]  ? setup_fault_attr+0x220/0x220
[  672.144258][T12277]  ? ___might_sleep+0x163/0x2c0
[  672.149121][T12277]  __should_failslab+0x121/0x190
[  672.154577][T12277]  should_failslab+0x9/0x14
[  672.159280][T12277]  kmem_cache_alloc_node+0x268/0x740
[  672.164576][T12277]  ? __dev_queue_xmit+0x173f/0x35c0
[  672.170439][T12277]  ? trace_hardirqs_on+0x67/0x240
[  672.175479][T12277]  ? __dev_queue_xmit+0x173f/0x35c0
[  672.180806][T12277]  __alloc_skb+0xd5/0x5e0
[  672.185414][T12277]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  672.190961][T12277]  alloc_skb_with_frags+0x93/0x590
[  672.196155][T12277]  ? find_held_lock+0x35/0x130
[  672.200913][T12277]  sock_alloc_send_pskb+0x7ad/0x920
[  672.206107][T12277]  ? sock_wmalloc+0x120/0x120
[  672.210774][T12277]  ? __local_bh_enable_ip+0x15a/0x270
[  672.216141][T12277]  ? ip6_finish_output2+0x1106/0x25c0
[  672.221615][T12277]  ? ip6_mtu+0x2e6/0x450
[  672.225857][T12277]  ? find_held_lock+0x35/0x130
[  672.230627][T12277]  sock_alloc_send_skb+0x32/0x40
[  672.235562][T12277]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  672.241316][T12277]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.246454][T12277]  ? ip6_setup_cork+0x1920/0x1920
[  672.251660][T12277]  ? ip6_flush_pending_frames+0xd0/0xd0
[  672.257395][T12277]  ? __kasan_check_read+0x11/0x20
[  672.262417][T12277]  ip6_make_skb+0x32f/0x570
[  672.266912][T12277]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.272038][T12277]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.277074][T12277]  ? ip6_push_pending_frames+0xf0/0xf0
[  672.282529][T12277]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  672.288085][T12277]  ? ip6_forward_finish+0x570/0x570
[  672.293393][T12277]  ? rcu_read_lock_held+0x9c/0xb0
[  672.298424][T12277]  udpv6_sendmsg+0x22a1/0x2b30
[  672.303185][T12277]  ? __kasan_check_write+0x14/0x20
[  672.308306][T12277]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.313325][T12277]  ? udp_v6_get_port+0x6b0/0x6b0
[  672.318248][T12277]  ? __kasan_check_read+0x11/0x20
[  672.323266][T12277]  ? mark_lock+0xc2/0x1220
[  672.327675][T12277]  ? __kasan_check_read+0x11/0x20
[  672.332685][T12277]  ? mark_lock+0xc2/0x1220
[  672.337101][T12277]  ? __kasan_check_read+0x11/0x20
[  672.342116][T12277]  ? ___might_sleep+0x163/0x2c0
[  672.346960][T12277]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  672.352592][T12277]  ? aa_sk_perm+0x346/0xb00
[  672.357095][T12277]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  672.362641][T12277]  inet6_sendmsg+0x9e/0xe0
[  672.367073][T12277]  ? inet6_sendmsg+0x9e/0xe0
[  672.371669][T12277]  ? inet6_ioctl+0x1c0/0x1c0
[  672.376359][T12277]  sock_sendmsg+0xd7/0x130
[  672.380786][T12277]  ____sys_sendmsg+0x358/0x880
[  672.385540][T12277]  ? kernel_sendmsg+0x50/0x50
[  672.390215][T12277]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  672.395750][T12277]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  672.401730][T12277]  ? find_held_lock+0x35/0x130
[  672.406572][T12277]  ___sys_sendmsg+0x100/0x170
[  672.411240][T12277]  ? sendmsg_copy_msghdr+0x70/0x70
[  672.416338][T12277]  ? __kasan_check_read+0x11/0x20
[  672.421359][T12277]  ? __might_fault+0x12b/0x1e0
[  672.426110][T12277]  ? find_held_lock+0x35/0x130
[  672.430861][T12277]  ? __might_fault+0x12b/0x1e0
[  672.435645][T12277]  ? do_dup2+0x4f0/0x4f0
[  672.439884][T12277]  ? lock_downgrade+0x920/0x920
[  672.445160][T12277]  ? ___might_sleep+0x163/0x2c0
[  672.450001][T12277]  __sys_sendmmsg+0x1bf/0x4d0
[  672.454676][T12277]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  672.459702][T12277]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  672.465928][T12277]  ? fput_many+0x12c/0x1a0
[  672.470345][T12277]  ? fput+0x1b/0x20
[  672.474138][T12277]  ? ksys_write+0x1cf/0x290
[  672.478631][T12277]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  672.484075][T12277]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  672.489519][T12277]  ? do_syscall_64+0x26/0x790
[  672.494181][T12277]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  672.500240][T12277]  ? do_syscall_64+0x26/0x790
[  672.504912][T12277]  __x64_sys_sendmmsg+0x9d/0x100
[  672.509838][T12277]  do_syscall_64+0xfa/0x790
[  672.514378][T12277]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  672.520264][T12277] RIP: 0033:0x45a919
[  672.524149][T12277] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  672.543839][T12277] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
20:01:14 executing program 0:
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0)
socket$kcm(0x10, 0x2, 0x0)
perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x4844, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x6698, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x56324a54, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000000000, 0x8001, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
socket(0x10, 0x4, 0x6)
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000002c0)={0x0, 'syz0\x00'})
r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x48401)
ioctl$RTC_PIE_ON(r1, 0x7005)
ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'sit0\x00', 0x300000000000})
prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20)
ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000240))
r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0)
ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0xfffffffffffffffb, 0xff, 0xffffffffffff7fff, 0x502, 0x10})
r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0xff00)
getresuid(&(0x7f0000000380), &(0x7f0000000300), &(0x7f0000000280))
r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00')
setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080))
r6 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r6, 0x4, 0xffffffffffffffff, 0x8)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000003c0)={[], 0x7, 0x7, 0x40, 0x9da, 0x5, r6})
connect$llc(r4, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10)

[  672.552254][T12277] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  672.560213][T12277] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  672.568190][T12277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  672.576147][T12277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  672.584351][T12277] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:14 executing program 3 (fault-call:2 fault-nth:23):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  672.770113][T12292] FAULT_INJECTION: forcing a failure.
[  672.770113][T12292] name failslab, interval 1, probability 0, space 0, times 0
[  672.783162][T12292] CPU: 0 PID: 12292 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  672.793070][T12292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  672.803140][T12292] Call Trace:
[  672.806468][T12292]  dump_stack+0x197/0x210
[  672.810868][T12292]  should_fail.cold+0xa/0x10
[  672.815486][T12292]  ? setup_fault_attr+0x220/0x220
[  672.820539][T12292]  ? ___might_sleep+0x163/0x2c0
[  672.825423][T12292]  __should_failslab+0x121/0x190
[  672.830393][T12292]  should_failslab+0x9/0x14
[  672.834928][T12292]  kmem_cache_alloc_node_trace+0x274/0x750
[  672.840759][T12292]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  672.846784][T12292]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  672.854271][T12292]  __kmalloc_node_track_caller+0x3d/0x70
[  672.859958][T12292]  __kmalloc_reserve.isra.0+0x40/0xf0
[  672.865353][T12292]  __alloc_skb+0x10b/0x5e0
20:01:14 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200000, 0x0)
ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x7600e1)

20:01:14 executing program 4:
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8)
write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0)
syz_open_dev$sg(0x0, 0x0, 0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
close(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x31982, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x900, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0)
r3 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80c00, 0x0)
fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000000), 0x1)
pipe(0x0)
bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10)
ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080))
connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
r5 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180)='/dev/udmabuf\x00', 0x2)
splice(r0, 0x0, r5, 0x0, 0xfffd, 0x0)
sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f00000001c0)=@in6={0xa, 0x4e22, 0x200, @rand_addr="3f35ffde5ce795fe0b532c60f68de496", 0x1000}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000340)="f3c997885e4201bf231e204321e0f1931cf4e6b1b7130b15bcc8679e8302f636ce0b2ec82c1ea47b8c7bf8572f3e7011cd8988c43617c850ed9bc45877e055e09dfd14fc0b7bcf488774391b4e0f5c9e2dbf455573b2704b8ea7a1b8c93178f3cc57cbe01d9510f9995196ddc5cb52924ac11fffcfa4395d5d40f5a40885952223851e9b0df371543f24ad912cfd48bcd245c7e22e913cbee9f4c47b6a1b585a737f0d3cfaefc39476e545d6224a4d9c3a651b84fa4cb62cfc7dd12ea6b880f64d8a67d96c1dc862b37cec27fe0dc2e2272241fe9a5f64c05bc15b2da5047e59978597fb7533fc6c9b0673d3e595e2a9e725ea7e1ee639", 0xf7}, {&(0x7f0000000200)="815341cf903118cbd4f9fa368f45975fe3872086cbfa26f400d56827a290831d8c28c2cda5c41f2655f47c5ab940675be08a8d715e6de7b34291c6", 0x3b}, {&(0x7f0000000240)="bf30724839de36af42b45291d40ced422eb67004d5abcb64a6ef7feb445a352865654554d2a39660c41d59ec9f2696269c56e035a0f10f7bdd8aa858c2c4a472a2d03b6928d75cbaa3a04df32ab4e7be4377e949d8a1", 0x56}, {&(0x7f0000000440)="b37a528d7e53b833d2f21c41f10202f75ac5818c948babea1aeee91f626c6fd1930057d979a24fee97c6aad152020eb5a64700ec7226dccd04ef982be0a697a21e6e214ba399019a60e053b1b2f240fedde095ab7ff3b45cb6e25f5e6d5a945b47e068e2e00b4f22904689b5eda988a94d5f14223f5f736c45643dcc55c75bba3a378458b2348e18fd3ed78f5f2ca091329d4a7b2a4a507844936ab8a1ef8d5dbf29b91e0b7175343796a664d90562792be5a0d1fc7198b2a6c570538d0a97a5cf98e949842a12cfb6778a2e10a2be2e3e77dd2e4519584685a96734c336b254abcf11", 0xe3}], 0x4, &(0x7f0000000580)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x12e}}], 0x38, 0x40000000}, 0x400cc028)
r6 = syz_open_dev$vcsa(&(0x7f0000000980)='/dev/vcsa#\x00', 0x4, 0x480000)
setsockopt$TIPC_DEST_DROPPABLE(r6, 0x10f, 0x81, &(0x7f00000009c0)=0xd6a, 0x4)

[  672.869792][T12292]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  672.875365][T12292]  alloc_skb_with_frags+0x93/0x590
[  672.880509][T12292]  ? find_held_lock+0x35/0x130
[  672.885423][T12292]  sock_alloc_send_pskb+0x7ad/0x920
[  672.890663][T12292]  ? sock_wmalloc+0x120/0x120
[  672.895664][T12292]  ? __local_bh_enable_ip+0x15a/0x270
[  672.901086][T12292]  ? ip6_finish_output2+0x1106/0x25c0
[  672.906520][T12292]  ? ip6_mtu+0x2e6/0x450
[  672.910788][T12292]  ? find_held_lock+0x35/0x130
[  672.916509][T12292]  sock_alloc_send_skb+0x32/0x40
[  672.921743][T12292]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  672.927597][T12292]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.934979][T12292]  ? ip6_setup_cork+0x1920/0x1920
[  672.940055][T12292]  ? ip6_flush_pending_frames+0xd0/0xd0
[  672.945627][T12292]  ? __kasan_check_read+0x11/0x20
[  672.950683][T12292]  ip6_make_skb+0x32f/0x570
[  672.955301][T12292]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.960347][T12292]  ? ip_reply_glue_bits+0xc0/0xc0
[  672.960366][T12292]  ? ip6_push_pending_frames+0xf0/0xf0
[  672.960386][T12292]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  672.960403][T12292]  ? ip6_forward_finish+0x570/0x570
[  672.960417][T12292]  ? rcu_read_lock_held+0x9c/0xb0
[  672.960440][T12292]  udpv6_sendmsg+0x22a1/0x2b30
[  672.992019][T12292]  ? __kasan_check_write+0x14/0x20
[  672.997419][T12292]  ? ip_reply_glue_bits+0xc0/0xc0
[  673.002470][T12292]  ? udp_v6_get_port+0x6b0/0x6b0
[  673.007525][T12292]  ? __kasan_check_read+0x11/0x20
[  673.012593][T12292]  ? mark_lock+0xc2/0x1220
[  673.017065][T12292]  ? __kasan_check_read+0x11/0x20
[  673.022202][T12292]  ? mark_lock+0xc2/0x1220
[  673.027065][T12292]  ? __kasan_check_read+0x11/0x20
[  673.032208][T12292]  ? ___might_sleep+0x163/0x2c0
[  673.037083][T12292]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  673.042874][T12292]  ? aa_sk_perm+0x346/0xb00
[  673.047414][T12292]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  673.053096][T12292]  inet6_sendmsg+0x9e/0xe0
[  673.057566][T12292]  ? inet6_sendmsg+0x9e/0xe0
[  673.062268][T12292]  ? inet6_ioctl+0x1c0/0x1c0
[  673.067330][T12292]  sock_sendmsg+0xd7/0x130
[  673.071742][T12292]  ____sys_sendmsg+0x358/0x880
[  673.076615][T12292]  ? kernel_sendmsg+0x50/0x50
[  673.081393][T12292]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  673.086934][T12292]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  673.093006][T12292]  ? find_held_lock+0x35/0x130
[  673.098126][T12292]  ___sys_sendmsg+0x100/0x170
[  673.102829][T12292]  ? sendmsg_copy_msghdr+0x70/0x70
[  673.107992][T12292]  ? __kasan_check_read+0x11/0x20
[  673.113044][T12292]  ? __might_fault+0x12b/0x1e0
[  673.118148][T12292]  ? find_held_lock+0x35/0x130
[  673.122953][T12292]  ? __might_fault+0x12b/0x1e0
[  673.127721][T12292]  ? do_dup2+0x4f0/0x4f0
[  673.131970][T12292]  ? lock_downgrade+0x920/0x920
[  673.136843][T12292]  ? ___might_sleep+0x163/0x2c0
[  673.141865][T12292]  __sys_sendmmsg+0x1bf/0x4d0
[  673.146556][T12292]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  673.151754][T12292]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  673.158749][T12292]  ? fput_many+0x12c/0x1a0
[  673.164214][T12292]  ? fput+0x1b/0x20
[  673.168058][T12292]  ? ksys_write+0x1cf/0x290
[  673.172635][T12292]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  673.178554][T12292]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  673.184096][T12292]  ? do_syscall_64+0x26/0x790
[  673.188785][T12292]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  673.195568][T12292]  ? do_syscall_64+0x26/0x790
[  673.200608][T12292]  __x64_sys_sendmmsg+0x9d/0x100
[  673.205703][T12292]  do_syscall_64+0xfa/0x790
[  673.210399][T12292]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  673.216292][T12292] RIP: 0033:0x45a919
[  673.220193][T12292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  673.240015][T12292] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  673.248435][T12292] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  673.256506][T12292] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  673.264583][T12292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  673.272565][T12292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  673.280536][T12292] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  676.688705][    C0] net_ratelimit: 20 callbacks suppressed
[  676.688713][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  676.700951][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  677.408671][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  677.414948][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  677.421487][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  677.427613][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  677.433546][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  677.439653][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  677.498692][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  677.504963][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:01:21 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080))
ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000000)=0x80)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r2, 0x0)
connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
accept(r2, 0x0, 0x0)

20:01:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'})
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x97}, 0x2)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = fcntl$dupfd(r3, 0x0, r2)
preadv(r3, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/48, 0x30}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/247, 0xf7}], 0x3, 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff})

20:01:21 executing program 3 (fault-call:2 fault-nth:24):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:21 executing program 0:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00')
write$input_event(r0, &(0x7f0000000340)={{0x77359400}, 0x4, 0x1000, 0x80000000}, 0x18)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x51, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000000))
r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0)
write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="5be579d52d65c30656158f342dac877279eb892695356fd23c2a536142c5ffeaeba47f2dd8d79f2f0ebb76e58430c9d1e46c05ec27cd5b4f147058c4e73d631b5ddc67744d84462dc2228f1c487b9b509f634fd51aa2a9fd400930a8ce4f07ed3cc1dedda2899aa665746b126aeb9caeac803882e98a4d3ec5d31b0dfbcd681da77600"/167], 0x1)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, &(0x7f00000017c0), 0x51, 0x0)
write$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8)
close(r3)
fallocate(r2, 0x0, 0x40000, 0x4)
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
fallocate(r5, 0x4, 0x5, 0x5)
mmap$dsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
fallocate(r1, 0x0, 0x0, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x3f000000, r2, 0x0, 0x8})
r6 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3f, 0x2000)
faccessat(r6, &(0x7f0000000200)='./file0\x00', 0x122, 0x200)

20:01:21 executing program 2:
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0)=0x6e8c, 0x4)
r1 = socket(0x10, 0x3, 0x0)
setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x7, 0x4)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', <r3=>0x0})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="7c000000250007050000000000009de9617f0000", @ANYRES32=r3, @ANYBLOB="00ff0000ffffffff0000000008000e07006f26b008000100736671004800020000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000b7d9a9b100"/100], 0x7c}}, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
sendmmsg$alg(r1, &(0x7f0000000140), 0x93b657, 0x0)
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xfffffea0)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)="9da77e37334b4e1a766f016322f0be046110f860f5d4085c3ead66fb470ea2201de620fd952480266f9b91517c232a7f38ab787b6c82c920ac14fb0f7a734171839ba8d307ba5f1d2ba14aedbb1787d7724ab55f0873f7cf6c677c8d386eb6d3d0e21f3444898435cfbce73f325557065df12b03d5bfc4869331f84fa4b0edf311aeb8cd98ce78f11f34eb180dbbff747ea08e80fe4081585593be4b988afcf7131b056ec4992efdbb68fb0fa095be8bf73408edec70611b4d1704e4a1", 0xbd, r7}, 0x68)

20:01:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:01:21 executing program 2:
perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000140)=0x1)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
accept4$bt_l2cap(r0, &(0x7f0000000000), 0x0, 0x0)
ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x4c)
userfaultfd(0x0)

[  679.212165][T12316] FAULT_INJECTION: forcing a failure.
[  679.212165][T12316] name failslab, interval 1, probability 0, space 0, times 0
[  679.252793][T12316] CPU: 1 PID: 12316 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  679.262750][T12316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  679.272943][T12316] Call Trace:
[  679.272967][T12316]  dump_stack+0x197/0x210
[  679.272989][T12316]  should_fail.cold+0xa/0x10
[  679.273006][T12316]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  679.273029][T12316]  ? setup_fault_attr+0x220/0x220
[  679.281112][T12316]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  679.281139][T12316]  __should_failslab+0x121/0x190
[  679.307332][T12316]  should_failslab+0x9/0x14
[  679.312029][T12316]  kmem_cache_alloc+0x47/0x710
[  679.317386][T12316]  ? __kasan_check_read+0x11/0x20
[  679.322444][T12316]  skb_clone+0x154/0x3d0
[  679.326824][T12316]  ip6_finish_output2+0x18be/0x25c0
[  679.332394][T12316]  ? ip6_mtu+0x2e6/0x450
[  679.336724][T12316]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  679.342318][T12316]  ? lock_downgrade+0x920/0x920
[  679.347354][T12316]  ? rcu_read_lock_held+0x9c/0xb0
[  679.352409][T12316]  ? __kasan_check_read+0x11/0x20
[  679.357614][T12316]  __ip6_finish_output+0x444/0xaa0
[  679.362747][T12316]  ? __ip6_finish_output+0x444/0xaa0
[  679.368055][T12316]  ip6_finish_output+0x38/0x1f0
[  679.373018][T12316]  ip6_output+0x25e/0x880
[  679.377477][T12316]  ? ip6_finish_output+0x1f0/0x1f0
[  679.382730][T12316]  ? __ip6_finish_output+0xaa0/0xaa0
[  679.388096][T12316]  ? ip6_make_skb+0x370/0x570
[  679.393181][T12316]  ? ip_reply_glue_bits+0xc0/0xc0
[  679.398457][T12316]  ip6_local_out+0xbb/0x1b0
[  679.403104][T12316]  ip6_send_skb+0xbb/0x350
[  679.407552][T12316]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  679.413158][T12316]  ? ip6_forward_finish+0x570/0x570
[  679.418431][T12316]  udpv6_sendmsg+0x22f3/0x2b30
[  679.423490][T12316]  ? __kasan_check_write+0x14/0x20
[  679.429108][T12316]  ? ip_reply_glue_bits+0xc0/0xc0
[  679.434181][T12316]  ? udp_v6_get_port+0x6b0/0x6b0
[  679.439149][T12316]  ? __kasan_check_read+0x11/0x20
[  679.444286][T12316]  ? mark_lock+0xc2/0x1220
[  679.448732][T12316]  ? __kasan_check_read+0x11/0x20
[  679.453764][T12316]  ? mark_lock+0xc2/0x1220
[  679.458177][T12316]  ? __kasan_check_read+0x11/0x20
[  679.463227][T12316]  ? ___might_sleep+0x163/0x2c0
[  679.468121][T12316]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  679.473784][T12316]  ? aa_sk_perm+0x346/0xb00
[  679.478417][T12316]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  679.484270][T12316]  inet6_sendmsg+0x9e/0xe0
[  679.488704][T12316]  ? inet6_sendmsg+0x9e/0xe0
[  679.493321][T12316]  ? inet6_ioctl+0x1c0/0x1c0
[  679.497929][T12316]  sock_sendmsg+0xd7/0x130
[  679.502463][T12316]  ____sys_sendmsg+0x358/0x880
[  679.507245][T12316]  ? kernel_sendmsg+0x50/0x50
[  679.513850][T12316]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  679.519465][T12316]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  679.525549][T12316]  ? find_held_lock+0x35/0x130
[  679.530704][T12316]  ___sys_sendmsg+0x100/0x170
[  679.535408][T12316]  ? sendmsg_copy_msghdr+0x70/0x70
[  679.540563][T12316]  ? __kasan_check_read+0x11/0x20
[  679.545711][T12316]  ? __might_fault+0x12b/0x1e0
[  679.550520][T12316]  ? find_held_lock+0x35/0x130
[  679.555314][T12316]  ? __might_fault+0x12b/0x1e0
[  679.560317][T12316]  ? do_dup2+0x4f0/0x4f0
[  679.564586][T12316]  ? lock_downgrade+0x920/0x920
[  679.569576][T12316]  ? ___might_sleep+0x163/0x2c0
[  679.574447][T12316]  __sys_sendmmsg+0x1bf/0x4d0
[  679.579153][T12316]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  679.584256][T12316]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  679.590608][T12316]  ? fput_many+0x12c/0x1a0
[  679.595050][T12316]  ? fput+0x1b/0x20
[  679.598971][T12316]  ? ksys_write+0x1cf/0x290
[  679.603645][T12316]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  679.609160][T12316]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  679.615167][T12316]  ? do_syscall_64+0x26/0x790
[  679.620339][T12316]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  679.626467][T12316]  ? do_syscall_64+0x26/0x790
[  679.631481][T12316]  __x64_sys_sendmmsg+0x9d/0x100
[  679.636447][T12316]  do_syscall_64+0xfa/0x790
[  679.640977][T12316]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  679.647087][T12316] RIP: 0033:0x45a919
[  679.651175][T12316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  679.670883][T12316] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  679.679416][T12316] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  679.687569][T12316] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  679.695681][T12316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  679.703907][T12316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  679.711903][T12316] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:21 executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x3f, 0x6d, 0x2, 0x0, 0x0}, 0x26)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20)
socket$vsock_stream(0x28, 0x1, 0x0)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x1, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000001c0)={0x81, 0x7, 0x5})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x400000, 0x0)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00')
sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x3010}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xcc, r3, 0x200, 0x200, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xaf46}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4e93}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x87}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa3d}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x80}, 0x0)
r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x800000, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r5, 0x0, 0x0, 0x4000000, 0x0, 0x0)
r6 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r6, &(0x7f0000b55000)={0x2, 0xffff, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10)
ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000040)=0xffffffffffffffff)
ioctl$int_in(r6, 0x5452, &(0x7f00000000c0)=0x100000000000006)
sendto$inet(r6, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10)
r7 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00')
ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000280)={0x1ff, 0x1, 0x5, 0x7, 0x2, 0x31f})
r8 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00')
fchdir(r8)
sendto(r6, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x0)

20:01:21 executing program 3 (fault-call:2 fault-nth:25):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:21 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4)
bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4)
recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}, 0x1)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
fchmod(0xffffffffffffffff, 0x4a)
openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000002c0))
ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x0, 0x200})
write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf)
shutdown(r0, 0x1)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f0000000580))
setgid(0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0xd909}, 0x100)

20:01:22 executing program 2:
perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600)
pipe(&(0x7f0000000680)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = getpid()
sched_setscheduler(r2, 0x5, &(0x7f0000000380))
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = dup(r3)
setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d)
r5 = getpgrp(0x0)
capget(&(0x7f0000000000)={0x0, r5}, 0x0)
r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r7 = socket$kcm(0x11, 0xa, 0x300)
ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040))
fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, <r8=>0x0})
r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
fsetxattr$system_posix_acl(r9, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0)
r10 = socket(0xa, 0x3, 0x8)
r11 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000)
ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4})
write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r12=>0xffffffffffffffff}}}, 0x20)
sendmsg$key(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0)
r13 = gettid()
waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480))
sendmsg$key(r10, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r12, @ANYRESDEC=r13]], 0xfffffffffffffe56}}, 0x20004850)
r14 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r15 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27)
r16 = dup2(r15, r14)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r16, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
r17 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r17)
r18 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40)
writev(r18, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2)
ioctl$SG_GET_REQUEST_TABLE(r18, 0x227d, &(0x7f0000000780))
kcmp(r17, r13, 0x0, 0xffffffffffffffff, r18)
ptrace$setopts(0x4206, r17, 0x0, 0x0)
r19 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, <r20=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x0, 0x5, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, r19, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r20}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r20}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r20}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r20}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={<r21=>r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r20}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r20}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r20}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r6, 0x0, 0x9d, &(0x7f0000000900)='GD@\xa4\x8d\x96Y5\x96Y?\xbdYto\xef\xe6K\xf1,a\x11\xba\xbd\xc6\xfap:yfs\x00=\xf0\xf3\xa7\xb7I\x1a\xc14\xa0\x9a\x9f&rb\x81\xb3\a\xd4\xb0zpk&\xb4\xe4\xa2\xc6\x1e\n\rnB\x1eE\x99K&\xbbG\xedO\xabqA\xfdi}\x00\xfd\t\x10\x8a\xda1\xd0_\x87q@K\xc6=\xe9\x12\xb7G\xdfu\xe3\xea\x9c#\x12X\x85\f\xc6\xea\x8c\x89\x06K\x94\x00\x00\x00\x00\x00\x00\x00\x00', r20}, 0x30)
pipe(&(0x7f0000000680)={0xffffffffffffffff, <r22=>0xffffffffffffffff})
r23 = getpid()
sched_setscheduler(r23, 0x5, &(0x7f0000000380))
r24 = socket$packet(0x11, 0x3, 0x300)
r25 = dup(r24)
setsockopt$packet_int(r25, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d)
r26 = getpgrp(0x0)
capget(&(0x7f0000000000)={0x0, r26}, 0x0)
r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r28 = socket$kcm(0x11, 0xa, 0x300)
ioctl$sock_kcm_SIOCKCMUNATTACH(r28, 0x5452, &(0x7f0000000040))
fcntl$getownex(r28, 0x10, &(0x7f0000000580)={0x0, <r29=>0x0})
r30 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
fsetxattr$system_posix_acl(r30, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0)
r31 = socket(0xa, 0x3, 0x8)
r32 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000)
ioctl$sock_inet_SIOCSIFFLAGS(r31, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4})
write$RDMA_USER_CM_CMD_CREATE_ID(r32, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r33=>0xffffffffffffffff}}}, 0x20)
sendmsg$key(r31, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0)
r34 = gettid()
waitid(0x83b895581628fca4, r34, &(0x7f0000000040), 0x2, &(0x7f0000000480))
sendmsg$key(r31, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r33, @ANYRESDEC=r34]], 0xfffffffffffffe56}}, 0x20004850)
r35 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r36 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27)
r37 = dup2(r36, r35)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r37, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
r38 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r38)
r39 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40)
writev(r39, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2)
ioctl$SG_GET_REQUEST_TABLE(r39, 0x227d, &(0x7f0000000780))
kcmp(r38, r34, 0x0, 0xffffffffffffffff, r39)
ptrace$setopts(0x4206, r38, 0x0, 0x0)
r40 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, <r41=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x0, 0x5, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r38, r40, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r41}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r34, r37, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r41}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r41}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r41}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r41}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r41}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={<r42=>r29, r30, 0x0, 0x1, &(0x7f0000000080)='\x00', r41}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r27, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r41}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r41}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r41}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r26, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r41}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r41}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r42, r25, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r41}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r23, r22, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r41}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r41}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r41}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000140)='md5sum\x00', r41}, 0x30)
r43 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r43, 0x40086602, &(0x7f0000000080))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xc0, &(0x7f0000000a80)={0x0, <r44=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x806, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x0, 0x2}, 0x0, 0x0, &(0x7f00000009c0)={0x5, 0x1, 0x9}, &(0x7f0000000a00)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=0x1}}, 0x10)
r45 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r45, &(0x7f0000000000)=ANY=[], 0x32600)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r5, r45, 0x0, 0xa, &(0x7f0000000bc0)='cgroup.subtree_control\x00', r44}, 0xfffffffffffffe51)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r20}, 0xfffffc6c)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r21, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r20}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r20}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r20}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r20}, 0xc)
r46 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r46, 0x40086602, &(0x7f0000000080))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r46, 0x0, 0xfffffffffffffe91, &(0x7f0000000140)='md5sum\x00', r20}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x14, &(0x7f0000000000)='cpusetselfvmnet0@{:\x00', r20}, 0x30)
sync()

[  680.010802][T12342] FAULT_INJECTION: forcing a failure.
[  680.010802][T12342] name failslab, interval 1, probability 0, space 0, times 0
[  680.023727][T12342] CPU: 0 PID: 12342 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  680.033716][T12342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  680.044740][T12342] Call Trace:
[  680.048055][T12342]  dump_stack+0x197/0x210
[  680.052443][T12342]  should_fail.cold+0xa/0x10
[  680.057254][T12342]  ? is_bpf_text_address+0xac/0x160
[  680.062589][T12342]  ? setup_fault_attr+0x220/0x220
[  680.068095][T12342]  __should_failslab+0x121/0x190
[  680.073147][T12342]  should_failslab+0x9/0x14
[  680.077716][T12342]  kmem_cache_alloc+0x47/0x710
[  680.082595][T12342]  ? lock_acquire+0x190/0x410
[  680.087319][T12342]  ? net_tx_action+0xd30/0xd30
[  680.090853][T12345] bridge0: port 3(gretap0) entered blocking state
[  680.092096][T12342]  skb_clone+0x154/0x3d0
[  680.092120][T12342]  dev_queue_xmit_nit+0x3a1/0xaa0
[  680.092149][T12342]  dev_hard_start_xmit+0xbb/0x9b0
[  680.092170][T12342]  ? validate_xmit_skb_list+0xfc/0x150
[  680.092193][T12342]  sch_direct_xmit+0x372/0xd30
[  680.092217][T12342]  ? dev_watchdog+0xca0/0xca0
[  680.092236][T12342]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  680.092253][T12342]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  680.092272][T12342]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  680.092285][T12342]  ? sfb_dequeue+0x421/0x4d0
[  680.092307][T12342]  __qdisc_run+0x4bf/0x1770
[  680.099533][T12345] bridge0: port 3(gretap0) entered disabled state
[  680.103001][T12342]  __dev_queue_xmit+0x1650/0x35c0
[  680.103032][T12342]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  680.103057][T12342]  ? mark_held_locks+0xf0/0xf0
[  680.103077][T12342]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  680.103095][T12342]  ? debug_smp_processor_id+0x33/0x18a
[  680.103116][T12342]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  680.103135][T12342]  ? rcu_read_lock_held_common+0xbd/0x130
[  680.103157][T12342]  dev_queue_xmit+0x18/0x20
[  680.103179][T12342]  ? dev_queue_xmit+0x18/0x20
[  680.113484][T12342]  neigh_direct_output+0x16/0x20
[  680.113503][T12342]  ip6_finish_output2+0x109a/0x25c0
[  680.113526][T12342]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  680.113540][T12342]  ? lock_downgrade+0x920/0x920
[  680.113562][T12342]  ? netif_rx_ni+0x670/0x670
[  680.113579][T12342]  ? __kasan_check_read+0x11/0x20
[  680.113602][T12342]  __ip6_finish_output+0x444/0xaa0
[  680.126771][T12345] device gretap0 entered promiscuous mode
[  680.128967][T12342]  ? __ip6_finish_output+0x444/0xaa0
[  680.128988][T12342]  ip6_finish_output+0x38/0x1f0
[  680.129006][T12342]  ip6_output+0x25e/0x880
[  680.129024][T12342]  ? ip6_finish_output+0x1f0/0x1f0
[  680.129044][T12342]  ? __ip6_finish_output+0xaa0/0xaa0
[  680.129058][T12342]  ? ip6_make_skb+0x370/0x570
[  680.129075][T12342]  ? ip_reply_glue_bits+0xc0/0xc0
[  680.129099][T12342]  ip6_local_out+0xbb/0x1b0
[  680.129125][T12342]  ip6_send_skb+0xbb/0x350
[  680.137918][T12345] bridge0: port 3(gretap0) entered blocking state
[  680.141403][T12342]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  680.141418][T12342]  ? ip6_forward_finish+0x570/0x570
[  680.141445][T12342]  udpv6_sendmsg+0x22f3/0x2b30
[  680.141463][T12342]  ? __kasan_check_write+0x14/0x20
[  680.141481][T12342]  ? ip_reply_glue_bits+0xc0/0xc0
[  680.141506][T12342]  ? udp_v6_get_port+0x6b0/0x6b0
[  680.141521][T12342]  ? __kasan_check_read+0x11/0x20
[  680.141537][T12342]  ? mark_lock+0xc2/0x1220
[  680.141558][T12342]  ? __kasan_check_read+0x11/0x20
[  680.141572][T12342]  ? mark_lock+0xc2/0x1220
[  680.141586][T12342]  ? __kasan_check_read+0x11/0x20
[  680.141608][T12342]  ? ___might_sleep+0x163/0x2c0
[  680.148241][T12345] bridge0: port 3(gretap0) entered forwarding state
[  680.152450][T12342]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  680.152469][T12342]  ? aa_sk_perm+0x346/0xb00
[  680.152503][T12342]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  680.152527][T12342]  inet6_sendmsg+0x9e/0xe0
[  680.152547][T12342]  ? inet6_sendmsg+0x9e/0xe0
[  680.168628][T12342]  ? inet6_ioctl+0x1c0/0x1c0
[  680.168645][T12342]  sock_sendmsg+0xd7/0x130
[  680.168663][T12342]  ____sys_sendmsg+0x358/0x880
[  680.168680][T12342]  ? kernel_sendmsg+0x50/0x50
[  680.168698][T12342]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  680.168715][T12342]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  680.168730][T12342]  ? find_held_lock+0x35/0x130
[  680.168756][T12342]  ___sys_sendmsg+0x100/0x170
[  680.168776][T12342]  ? sendmsg_copy_msghdr+0x70/0x70
[  680.178804][T12342]  ? __kasan_check_read+0x11/0x20
[  680.178825][T12342]  ? __might_fault+0x12b/0x1e0
[  680.178841][T12342]  ? find_held_lock+0x35/0x130
[  680.178856][T12342]  ? __might_fault+0x12b/0x1e0
[  680.178874][T12342]  ? do_dup2+0x4f0/0x4f0
[  680.178893][T12342]  ? lock_downgrade+0x920/0x920
[  680.178922][T12342]  ? ___might_sleep+0x163/0x2c0
[  680.178945][T12342]  __sys_sendmmsg+0x1bf/0x4d0
[  680.477641][T12342]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  680.482676][T12342]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  680.489015][T12342]  ? fput_many+0x12c/0x1a0
[  680.493816][T12342]  ? fput+0x1b/0x20
[  680.497611][T12342]  ? ksys_write+0x1cf/0x290
[  680.502156][T12342]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  680.507808][T12342]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  680.513731][T12342]  ? do_syscall_64+0x26/0x790
[  680.518683][T12342]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  680.524939][T12342]  ? do_syscall_64+0x26/0x790
[  680.529714][T12342]  __x64_sys_sendmmsg+0x9d/0x100
[  680.534686][T12342]  do_syscall_64+0xfa/0x790
[  680.539486][T12342]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  680.547842][T12342] RIP: 0033:0x45a919
[  680.551765][T12342] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  680.571886][T12342] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  680.580398][T12342] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  680.588394][T12342] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  680.596367][T12342] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  680.604343][T12342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  680.612306][T12342] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:22 executing program 3 (fault-call:2 fault-nth:26):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  680.845699][T12351] FAULT_INJECTION: forcing a failure.
[  680.845699][T12351] name failslab, interval 1, probability 0, space 0, times 0
[  680.866496][T12351] CPU: 1 PID: 12351 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  680.876599][T12351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  680.886694][T12351] Call Trace:
[  680.890000][T12351]  dump_stack+0x197/0x210
[  680.894361][T12351]  should_fail.cold+0xa/0x10
[  680.899147][T12351]  ? setup_fault_attr+0x220/0x220
[  680.904193][T12351]  ? ___might_sleep+0x163/0x2c0
[  680.909077][T12351]  __should_failslab+0x121/0x190
[  680.914042][T12351]  should_failslab+0x9/0x14
[  680.918547][T12351]  kmem_cache_alloc_node+0x268/0x740
[  680.918564][T12351]  ? __dev_queue_xmit+0x173f/0x35c0
[  680.918580][T12351]  ? trace_hardirqs_on+0x67/0x240
[  680.918596][T12351]  ? __dev_queue_xmit+0x173f/0x35c0
[  680.918616][T12351]  __alloc_skb+0xd5/0x5e0
[  680.918635][T12351]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  680.918658][T12351]  alloc_skb_with_frags+0x93/0x590
[  680.954303][T12351]  ? find_held_lock+0x35/0x130
[  680.959099][T12351]  sock_alloc_send_pskb+0x7ad/0x920
[  680.964346][T12351]  ? sock_wmalloc+0x120/0x120
[  680.969047][T12351]  ? __local_bh_enable_ip+0x15a/0x270
[  680.974450][T12351]  ? ip6_finish_output2+0x1106/0x25c0
[  680.979859][T12351]  ? ip6_mtu+0x2e6/0x450
[  680.984144][T12351]  ? find_held_lock+0x35/0x130
[  680.988943][T12351]  sock_alloc_send_skb+0x32/0x40
[  680.993915][T12351]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  680.999698][T12351]  ? ip_reply_glue_bits+0xc0/0xc0
[  681.004797][T12351]  ? ip6_setup_cork+0x1920/0x1920
[  681.009905][T12351]  ? ip6_flush_pending_frames+0xd0/0xd0
[  681.015534][T12351]  ? __kasan_check_read+0x11/0x20
[  681.020550][T12351]  ip6_make_skb+0x32f/0x570
[  681.025080][T12351]  ? ip_reply_glue_bits+0xc0/0xc0
[  681.030094][T12351]  ? ip_reply_glue_bits+0xc0/0xc0
[  681.035104][T12351]  ? ip6_push_pending_frames+0xf0/0xf0
[  681.042574][T12351]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  681.048106][T12351]  ? ip6_forward_finish+0x570/0x570
[  681.053288][T12351]  ? rcu_read_lock_held+0x9c/0xb0
[  681.059968][T12351]  udpv6_sendmsg+0x22a1/0x2b30
[  681.064724][T12351]  ? __kasan_check_write+0x14/0x20
[  681.069818][T12351]  ? ip_reply_glue_bits+0xc0/0xc0
[  681.074835][T12351]  ? udp_v6_get_port+0x6b0/0x6b0
[  681.079754][T12351]  ? __kasan_check_read+0x11/0x20
[  681.084760][T12351]  ? mark_lock+0xc2/0x1220
[  681.089168][T12351]  ? __kasan_check_read+0x11/0x20
[  681.094193][T12351]  ? mark_lock+0xc2/0x1220
[  681.098679][T12351]  ? __kasan_check_read+0x11/0x20
[  681.103690][T12351]  ? ___might_sleep+0x163/0x2c0
[  681.108541][T12351]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  681.114184][T12351]  ? aa_sk_perm+0x346/0xb00
[  681.118679][T12351]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  681.124223][T12351]  inet6_sendmsg+0x9e/0xe0
[  681.128634][T12351]  ? inet6_sendmsg+0x9e/0xe0
[  681.133215][T12351]  ? inet6_ioctl+0x1c0/0x1c0
[  681.137800][T12351]  sock_sendmsg+0xd7/0x130
[  681.142205][T12351]  ____sys_sendmsg+0x358/0x880
[  681.146962][T12351]  ? kernel_sendmsg+0x50/0x50
[  681.151623][T12351]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  681.157150][T12351]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  681.163123][T12351]  ? find_held_lock+0x35/0x130
[  681.167969][T12351]  ___sys_sendmsg+0x100/0x170
[  681.172841][T12351]  ? sendmsg_copy_msghdr+0x70/0x70
[  681.177942][T12351]  ? __kasan_check_read+0x11/0x20
[  681.184173][T12351]  ? __might_fault+0x12b/0x1e0
[  681.188928][T12351]  ? find_held_lock+0x35/0x130
[  681.193700][T12351]  ? __might_fault+0x12b/0x1e0
[  681.199410][T12351]  ? do_dup2+0x4f0/0x4f0
[  681.203640][T12351]  ? lock_downgrade+0x920/0x920
[  681.208492][T12351]  ? ___might_sleep+0x163/0x2c0
[  681.213335][T12351]  __sys_sendmmsg+0x1bf/0x4d0
[  681.218015][T12351]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  681.223033][T12351]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  681.229255][T12351]  ? fput_many+0x12c/0x1a0
[  681.233650][T12351]  ? fput+0x1b/0x20
[  681.237452][T12351]  ? ksys_write+0x1cf/0x290
[  681.241937][T12351]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  681.247381][T12351]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  681.252840][T12351]  ? do_syscall_64+0x26/0x790
[  681.257505][T12351]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  681.263642][T12351]  ? do_syscall_64+0x26/0x790
[  681.268312][T12351]  __x64_sys_sendmmsg+0x9d/0x100
[  681.273232][T12351]  do_syscall_64+0xfa/0x790
[  681.277715][T12351]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  681.283607][T12351] RIP: 0033:0x45a919
[  681.287485][T12351] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  681.307083][T12351] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  681.315486][T12351] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  681.323439][T12351] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  681.331584][T12351] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  681.339558][T12351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  681.347598][T12351] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  682.928713][    C0] net_ratelimit: 20 callbacks suppressed
[  682.934517][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  682.940648][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  683.648725][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  683.654577][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  683.660372][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  683.666092][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  683.671866][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  683.677636][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  683.728647][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  683.734435][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  689.178656][    C0] net_ratelimit: 20 callbacks suppressed
[  689.178663][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  689.191217][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  689.888652][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  689.894495][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  689.900598][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  689.906506][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  689.913860][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  689.919811][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  689.968687][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  689.975408][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:01:33 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000240))
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0)
socket(0x10, 0x2, 0x0)
syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000780)=[{&(0x7f0000000480)}, {&(0x7f0000000680)}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c696f636861727365743d6575632d6a702c71756965742c756d61736b3d30303030303030303030303030303030303030303030302c6769643dc2770fdd503132f8920d743a2a2b6e133a994f8a249e273fe25ddcc50c598fff4b30d3fcb7deeb3cb86c3d8d402327cf781baa7488930cb2bebc75c2993f5576b5ed82af6b97ca0623448b3a893f452f2a74b58d3c72258b084eaf4b27950825612319bc90adc1d945a1a8486a2741a9c91db5d58b13bf9888", @ANYRESHEX, @ANYBLOB="0000000468182b0c0cfe632596308af0885f57db9a29eacbea0d7ea2481c93838b9ca3d21bd08dfbace4908571b8094825036894b8a797dda130d63b543a76e23eda78ae2b4f7f3898af57dbc81800fb5a9a9e9a0cc5ea5ad8d4bdc27f66b31ab12181cac5b99598861f4fdaac21f4579a0befa3933503d824448fca2732da76887e36fca13d65556f6834953ea579d69d83be7801f154430f31b258f55360cfbbfe66a0ccffcf090d6994c53b38a15a73e0032704662ddd140b1d73b65cf69ff9d6b2eb1c448171ab89a343e0eb3accc53038b25a6a82b8d645288c51420c582a586cfac2", @ANYRESHEX=0x0, @ANYBLOB=',obj_user=bbr\x00,rootcontext=user_u,func=FILE_MMAP,appraise_type=imasig,\x00'])
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
openat$cachefiles(0xffffffffffffff9c, 0x0, 0x400, 0x0)
ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x14f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0x0)
syz_open_dev$usbfs(0x0, 0x40000000909, 0x0)
ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0)
ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000000))
keyctl$chown(0x4, 0x0, 0x0, 0x0)
gettid()
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)

20:01:33 executing program 0:
sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a06000000a84306910000003900070035000c", 0xff9a}], 0x1}, 0x0)
write(0xffffffffffffffff, &(0x7f0000000000)="260000001100f5680300c10100de96ab8de887e010fffff000ba00000000f13a050003", 0x23)
r0 = socket(0x10, 0x80002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000002680)={0x54, 0x7, 0x3c, {0x4, 0x3}, {0x7, 0x3}, @cond=[{0xb7, 0xf800, 0x0, 0x0, 0x8001, 0x9}, {0x800, 0x7, 0xf001, 0x5, 0x1000, 0x2}]})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r5 = socket(0x2000000000000021, 0x2, 0x10000000000002)
connect$rxrpc(r5, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24)
sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41a118fd58fa1f0a39ad9582203daa32c9831699acc52f141eeca2bd12d2f6fb54e5bff40e062a43f80b1babfd076d2502892250deee2728316e63e589ddf142e89365bd48cf76602c6f6aa76bc37284732bd1e191ddd3c9f310f827c195f3c4957c67a08466517ba136c8c9e01000000f8ffffffffffffff3e26b5ca26bb434dbd0e5085c294e577bb081876e63e7c2834533925db8b54b33da7b947aefca1f9c49c648d58d4f944264fcace71d5c798cd3c13d7083a7eb4c526e072a23bd24cccb38e4eff542520858c940fbb95979a564d73a7af107fd5ddaa491838873914a467c3ce28056833eb4559864317c0a1dac92d090f4f9093679791a2840f2851324acdf44a807e69a1bc25d265303004e8ead128a3d61c0063233501cfdf76d99dbc46b9c00203a9161b8a444001c386475c432c7a6e898885429063954ea0bdf9abc7b9322f3485d99ab38a3231ea08584795647ddb75c593933ef3e588824acdab292482735cd91572d0bc3f95b61e039183f5ed7cb75f2ba79296f73ca6f00a0f6ce5c2bc03957a77dbd229921124580fc4ddd4aa3f3752c7f2dca3da2ba7b772e01215f05dc1cf74ddf51af1a4ebba443374e09d5ff96db1a1a60368493ff3"], 0x18}}], 0x1, 0x4048000)
sendmsg$nfc_llcp(r5, &(0x7f0000002640)={&(0x7f0000000080)={0x27, 0x0, 0x2, 0x0, 0x0, 0x5, "6a2c6f91fc156989f5541e5828017e8774ccb5c9b3942b357fcca8007f0e50dfab654f51bb2f7afd81808a23198110f8688fbc8b1fed73abb3e0c494a0c407", 0x16}, 0x60, &(0x7f0000002480)=[{&(0x7f0000000100)="c233768072c8e6faec531a22c72d9d93665b34cb517bace0c80093d7b22ebddd4eac23da8b7e4bab122e7403567b632771915b14006ef9e89e4fbe7ecc7fd4d78a7f719b3eb5743d73cd11c3d996f7f2435f1a05acf5436827ba3b3a56402b7c5349daeff6fe61eae86963b972f235096d008bc27a6e35254771faeaa87b2e3c1bdc948cefbf1c4a21df02ff9d6cb3d65455ed989d24a58ca43e4c45967134676329a373e207b0240d43d7d954c7f5f52ba5720efc13c06a9ad7625128", 0xbd}, {&(0x7f00000001c0)='n.', 0x2}, {&(0x7f0000000200)="a7a705028d71ff83244a5937f3ee69dc993758890bcff44a2c72b3d1ee4dff99e4ee787fc247aec35cb49c222307b79d615f19c41153d6647d61ef6dc58c89dfad10121d85d12ff3da1d3536d83bb60409c66ec88e9b160e671a64712914e2a1def4c1849cb2ad4079c35855bd5b5c18f96307cb7e9f5f488ab1fe8acf8025710021988448a669a68ce4c1c08e8a71161907cbef91155acf44775e02906a4ae7ceb9dae6d24d8c780fe2ffd6a4d21112d508fa93000480d1e9c5602af3483086ced81fa11223ab", 0xc7}, {&(0x7f0000000300)="7fc5d01f21e9cb563c3e02d3c4cede12f2ac0bd53e0114e96c99407a555d664746d135d319d484a104ed280108049006a87ce6238bdb2296bb78b74dc6129eb93bb9da9d0985733f466d86a808a79569e28991617655fbffeeebe96aa1950e9134c4ffa851c18c3a81b6aa4f010534f7fb567c5523f148b9f8ca294013da3b52dc3f51fbf6b54f3f0c27860fc78412324536b4", 0x93}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="1a99a5e57776a39df2c02f3e788ea8ac99bb73cc43e29b747173380065f22907911b7cbe281c48b94c856415061312c4490ddc6c74505a32e29f621699ae9d7c925e77a5fd65854b4ae5d995e8d769de6769710d68219cd9191ca8052c35f605a97fdfde31d4df265181569faf93dd348c4d3474fcab20c91797bb13d64f1b2109477a5165b558e2a600e3", 0x8b}, {&(0x7f0000001480)="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", 0x1000}], 0x7, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], 0x110, 0x4000000}, 0x800)
r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/dlm_plock\x00', 0x800, 0x0)
r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r7, 0x800, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x10)
sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000002780)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0xa1c0}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x14, r7, 0x8, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x27ee9575faa18da4}, 0x4000000)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x64, r7, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xb79}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x20084849)
sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0)

20:01:33 executing program 3 (fault-call:2 fault-nth:27):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:33 executing program 4:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002800)=ANY=[@ANYBLOB="280000003200015819aad2020095c9d70000000014000100100001000800030000000000000000001f86289731ad1d41a85747df905755"], 0x28}}, 0x0)
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00')
sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)={0x28, r2, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0)
sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r2, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7ad}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xe3a28edc31280be4}, 0x40)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket(0x6000000000010, 0x3, 0x0)
sendmmsg$alg(r5, &(0x7f0000000140), 0x492492492492778, 0x0)

20:01:33 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0)
ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0})
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2042, 0x0)
ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0x1, 0x8, 0x1})

20:01:33 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r1, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  691.895521][T12371] FAULT_INJECTION: forcing a failure.
[  691.895521][T12371] name failslab, interval 1, probability 0, space 0, times 0
[  691.926871][T12372] md: md0 has zero or unknown size, marking faulty!
[  691.930369][T12371] CPU: 0 PID: 12371 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  691.948684][T12372] md: md_import_device returned -22
[  691.950302][T12371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  691.950311][T12371] Call Trace:
[  691.950333][T12371]  dump_stack+0x197/0x210
[  691.950357][T12371]  should_fail.cold+0xa/0x10
[  691.950381][T12371]  ? setup_fault_attr+0x220/0x220
[  691.981749][T12379] md: md0 has zero or unknown size, marking faulty!
[  691.985032][T12371]  ? ___might_sleep+0x163/0x2c0
[  691.985054][T12371]  __should_failslab+0x121/0x190
[  691.985072][T12371]  should_failslab+0x9/0x14
[  691.985118][T12371]  kmem_cache_alloc_node_trace+0x274/0x750
[  691.998665][T12371]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  691.998683][T12371]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  691.998702][T12371]  __kmalloc_node_track_caller+0x3d/0x70
20:01:34 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
fcntl$setflags(r1, 0x2, 0x0)
r2 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_read_part_table(0x0, 0x0, &(0x7f0000000040))

[  691.998727][T12371]  __kmalloc_reserve.isra.0+0x40/0xf0
[  691.998754][T12371]  __alloc_skb+0x10b/0x5e0
[  692.009778][T12371]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  692.009802][T12371]  alloc_skb_with_frags+0x93/0x590
[  692.009817][T12371]  ? find_held_lock+0x35/0x130
[  692.009842][T12371]  sock_alloc_send_pskb+0x7ad/0x920
[  692.016051][T12379] md: md_import_device returned -22
[  692.023423][T12371]  ? sock_wmalloc+0x120/0x120
[  692.023439][T12371]  ? __local_bh_enable_ip+0x15a/0x270
20:01:34 executing program 2:
r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0)
r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/ddv/kvm\x00', 0x40000, 0x0)
fcntl$setflags(r2, 0x2, 0xbd42d67d4fedfe22)
r3 = dup2(r1, r0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'})
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6990600000000000000157711be18a3d918e0"})
write$sndseq(r0, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0xf9}, @addr}], 0x1c)

[  692.023456][T12371]  ? ip6_finish_output2+0x1106/0x25c0
[  692.023470][T12371]  ? ip6_mtu+0x2e6/0x450
[  692.023485][T12371]  ? find_held_lock+0x35/0x130
[  692.023503][T12371]  sock_alloc_send_skb+0x32/0x40
[  692.023526][T12371]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  692.122815][T12371]  ? ip_reply_glue_bits+0xc0/0xc0
[  692.122848][T12371]  ? ip6_setup_cork+0x1920/0x1920
[  692.122870][T12371]  ? ip6_flush_pending_frames+0xd0/0xd0
[  692.133562][T12371]  ? __kasan_check_read+0x11/0x20
[  692.133580][T12371]  ip6_make_skb+0x32f/0x570
[  692.133594][T12371]  ? ip_reply_glue_bits+0xc0/0xc0
[  692.133612][T12371]  ? ip_reply_glue_bits+0xc0/0xc0
[  692.133635][T12371]  ? ip6_push_pending_frames+0xf0/0xf0
[  692.172699][T12371]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  692.179323][T12371]  ? ip6_forward_finish+0x570/0x570
[  692.185524][T12371]  ? rcu_read_lock_held+0x9c/0xb0
[  692.192479][T12371]  udpv6_sendmsg+0x22a1/0x2b30
[  692.199668][T12371]  ? __kasan_check_write+0x14/0x20
[  692.207406][T12371]  ? ip_reply_glue_bits+0xc0/0xc0
[  692.213041][T12371]  ? udp_v6_get_port+0x6b0/0x6b0
[  692.218397][T12371]  ? __kasan_check_read+0x11/0x20
[  692.224021][T12371]  ? mark_lock+0xc2/0x1220
[  692.228741][T12371]  ? __kasan_check_read+0x11/0x20
[  692.235720][T12371]  ? mark_lock+0xc2/0x1220
[  692.240218][T12371]  ? __kasan_check_read+0x11/0x20
20:01:34 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f0000000280)='/dev/input/event#\x00', 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x40, 0x8f01, 0x4, 0x81})
write$binfmt_elf64(r2, &(0x7f0000000900)=ANY=[@ANYRES64=0x0], 0x7)
write$P9_RGETATTR(r0, &(0x7f0000000380)={0xfffffffffffffc5c}, 0xa0)
ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f00000000c0)={0x6, 0x6, @value=0xfe8b})
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r4 = dup2(0xffffffffffffffff, r2)
write$FUSE_LSEEK(r4, &(0x7f00000001c0)={0x18, 0x0, 0x2, {0x6}}, 0x18)

[  692.245469][T12371]  ? ___might_sleep+0x163/0x2c0
[  692.250455][T12371]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  692.256699][T12371]  ? aa_sk_perm+0x346/0xb00
[  692.261452][T12371]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  692.267221][T12371]  inet6_sendmsg+0x9e/0xe0
[  692.272387][T12371]  ? inet6_sendmsg+0x9e/0xe0
[  692.277517][T12371]  ? inet6_ioctl+0x1c0/0x1c0
[  692.282382][T12371]  sock_sendmsg+0xd7/0x130
[  692.287531][T12371]  ____sys_sendmsg+0x358/0x880
[  692.292476][T12371]  ? kernel_sendmsg+0x50/0x50
20:01:34 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0)
r0 = getpid()
signalfd4(0xffffffffffffffff, &(0x7f0000000100)={0x7f}, 0x8, 0x800)
sched_setscheduler(r0, 0x5, &(0x7f00000002c0))
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x40}, 0x2)
exit(0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
r3 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x0)
inotify_rm_watch(0xffffffffffffffff, r3)
inotify_rm_watch(r2, r3)
preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0)
sched_setscheduler(0x0, 0x5, &(0x7f0000000380))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000240)=0xfffffffffffffea5)
clone3(&(0x7f0000000340)={0x0, &(0x7f0000000080), 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x50)

[  692.297279][T12371]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  692.302955][T12371]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  692.308969][T12371]  ? find_held_lock+0x35/0x130
[  692.313767][T12371]  ___sys_sendmsg+0x100/0x170
[  692.318691][T12371]  ? sendmsg_copy_msghdr+0x70/0x70
[  692.323840][T12371]  ? __kasan_check_read+0x11/0x20
[  692.328914][T12371]  ? __might_fault+0x12b/0x1e0
[  692.333715][T12371]  ? find_held_lock+0x35/0x130
[  692.333734][T12371]  ? __might_fault+0x12b/0x1e0
[  692.333757][T12371]  ? do_dup2+0x4f0/0x4f0
[  692.343379][T12371]  ? lock_downgrade+0x920/0x920
[  692.343409][T12371]  ? ___might_sleep+0x163/0x2c0
[  692.343426][T12371]  __sys_sendmmsg+0x1bf/0x4d0
[  692.343447][T12371]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  692.368276][T12371]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  692.374824][T12371]  ? fput_many+0x12c/0x1a0
[  692.379501][T12371]  ? fput+0x1b/0x20
[  692.383458][T12371]  ? ksys_write+0x1cf/0x290
[  692.388873][T12371]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  692.388890][T12371]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  692.388905][T12371]  ? do_syscall_64+0x26/0x790
[  692.388927][T12371]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  692.411995][T12371]  ? do_syscall_64+0x26/0x790
[  692.417121][T12371]  __x64_sys_sendmmsg+0x9d/0x100
[  692.417143][T12371]  do_syscall_64+0xfa/0x790
[  692.417165][T12371]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  692.432844][T12371] RIP: 0033:0x45a919
[  692.437048][T12371] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  692.457222][T12371] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  692.465838][T12371] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  692.473864][T12371] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  692.481864][T12371] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  692.489982][T12371] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  692.498167][T12371] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:34 executing program 3 (fault-call:2 fault-nth:28):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:34 executing program 2:
perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x2, 0x2}, 0x10}}, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r2 = accept(r1, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x80)
mmap$snddsp_status(&(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1000002, 0x4010, r2, 0x82000000)

[  692.776350][T12407] FAULT_INJECTION: forcing a failure.
[  692.776350][T12407] name failslab, interval 1, probability 0, space 0, times 0
[  692.822895][T12407] CPU: 1 PID: 12407 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  692.833338][T12407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  692.844356][T12407] Call Trace:
[  692.848173][T12407]  dump_stack+0x197/0x210
[  692.852618][T12407]  should_fail.cold+0xa/0x10
[  692.857323][T12407]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  692.862740][T12407]  ? setup_fault_attr+0x220/0x220
[  692.868866][T12407]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  692.874324][T12407]  __should_failslab+0x121/0x190
[  692.880607][T12407]  should_failslab+0x9/0x14
[  692.885300][T12407]  kmem_cache_alloc+0x47/0x710
[  692.890529][T12407]  ? __kasan_check_read+0x11/0x20
[  692.895767][T12407]  skb_clone+0x154/0x3d0
[  692.900753][T12407]  ip6_finish_output2+0x18be/0x25c0
[  692.906068][T12407]  ? ip6_mtu+0x2e6/0x450
[  692.910348][T12407]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  692.916531][T12407]  ? lock_downgrade+0x920/0x920
[  692.921934][T12407]  ? rcu_read_lock_held+0x9c/0xb0
[  692.927144][T12407]  ? __kasan_check_read+0x11/0x20
[  692.932468][T12407]  __ip6_finish_output+0x444/0xaa0
[  692.938219][T12407]  ? __ip6_finish_output+0x444/0xaa0
[  692.943542][T12407]  ip6_finish_output+0x38/0x1f0
[  692.948528][T12407]  ip6_output+0x25e/0x880
[  692.953187][T12407]  ? ip6_finish_output+0x1f0/0x1f0
[  692.958521][T12407]  ? __ip6_finish_output+0xaa0/0xaa0
[  692.964082][T12407]  ? ip6_make_skb+0x370/0x570
[  692.969010][T12407]  ? ip_reply_glue_bits+0xc0/0xc0
[  692.974184][T12407]  ip6_local_out+0xbb/0x1b0
[  692.979146][T12407]  ip6_send_skb+0xbb/0x350
[  692.983753][T12407]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  692.989410][T12407]  ? ip6_forward_finish+0x570/0x570
[  692.994853][T12407]  udpv6_sendmsg+0x22f3/0x2b30
[  692.999859][T12407]  ? __kasan_check_write+0x14/0x20
[  693.005259][T12407]  ? ip_reply_glue_bits+0xc0/0xc0
[  693.011110][T12407]  ? udp_v6_get_port+0x6b0/0x6b0
[  693.016503][T12407]  ? __kasan_check_read+0x11/0x20
[  693.022290][T12407]  ? mark_lock+0xc2/0x1220
[  693.027048][T12407]  ? __kasan_check_read+0x11/0x20
[  693.032442][T12407]  ? mark_lock+0xc2/0x1220
[  693.037164][T12407]  ? __kasan_check_read+0x11/0x20
[  693.042625][T12407]  ? ___might_sleep+0x163/0x2c0
[  693.048936][T12407]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  693.055688][T12407]  ? aa_sk_perm+0x346/0xb00
[  693.060921][T12407]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  693.067026][T12407]  inet6_sendmsg+0x9e/0xe0
[  693.071569][T12407]  ? inet6_sendmsg+0x9e/0xe0
[  693.076468][T12407]  ? inet6_ioctl+0x1c0/0x1c0
[  693.081772][T12407]  sock_sendmsg+0xd7/0x130
[  693.086855][T12407]  ____sys_sendmsg+0x358/0x880
[  693.092001][T12407]  ? kernel_sendmsg+0x50/0x50
[  693.097204][T12407]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  693.103270][T12407]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  693.109446][T12407]  ? find_held_lock+0x35/0x130
[  693.115560][T12407]  ___sys_sendmsg+0x100/0x170
[  693.121090][T12407]  ? sendmsg_copy_msghdr+0x70/0x70
[  693.126675][T12407]  ? __kasan_check_read+0x11/0x20
[  693.131901][T12407]  ? __might_fault+0x12b/0x1e0
[  693.136778][T12407]  ? find_held_lock+0x35/0x130
[  693.142229][T12407]  ? __might_fault+0x12b/0x1e0
[  693.147292][T12407]  ? do_dup2+0x4f0/0x4f0
[  693.152121][T12407]  ? lock_downgrade+0x920/0x920
[  693.157286][T12407]  ? ___might_sleep+0x163/0x2c0
[  693.162470][T12407]  __sys_sendmmsg+0x1bf/0x4d0
[  693.167284][T12407]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  693.172859][T12407]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  693.180091][T12407]  ? fput_many+0x12c/0x1a0
[  693.185190][T12407]  ? fput+0x1b/0x20
[  693.189247][T12407]  ? ksys_write+0x1cf/0x290
[  693.194057][T12407]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  693.199633][T12407]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  693.205321][T12407]  ? do_syscall_64+0x26/0x790
[  693.210458][T12407]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  693.216809][T12407]  ? do_syscall_64+0x26/0x790
[  693.221512][T12407]  __x64_sys_sendmmsg+0x9d/0x100
[  693.227317][T12407]  do_syscall_64+0xfa/0x790
[  693.231845][T12407]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  693.238631][T12407] RIP: 0033:0x45a919
[  693.242561][T12407] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  693.264900][T12407] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  693.273448][T12407] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  693.283424][T12407] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  693.292691][T12407] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  693.301060][T12407] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  693.309887][T12407] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  694.528739][    C0] net_ratelimit: 12 callbacks suppressed
[  694.528747][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  694.544636][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  694.553671][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  694.562603][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  694.572138][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  694.579884][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  694.586809][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  694.593126][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  695.408695][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  695.414728][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  699.568722][    C0] net_ratelimit: 18 callbacks suppressed
[  699.568730][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  699.582502][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  700.768631][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  700.774541][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  700.780498][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  700.786293][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  700.792423][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  700.798296][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  700.804203][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  700.809998][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  702.302641][T12422] hfs: unable to parse mount options
20:01:45 executing program 5:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f00000001c0))
pipe(&(0x7f0000000340)={<r1=>0xffffffffffffffff})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, r1, 0x8)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0xb0}, 0x20)
r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil})
ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000})
ioctl$KVM_RUN(r5, 0xae80, 0x0)
capget(0x0, 0x0)
r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
write$evdev(r6, &(0x7f00000001c0)=[{{0x77359400}, 0x2, 0x7fff}], 0x18)
r7 = fcntl$dupfd(r6, 0x0, r4)
getsockname$tipc(r7, &(0x7f0000000180)=@name, &(0x7f00000002c0)=0x10)
ptrace$getregset(0x4204, 0x0, 0x201, 0x0)
io_setup(0x0, 0x0)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000000), 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x7)
r8 = socket(0x80000000000000a, 0x2, 0x0)
close(r8)
r9 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [<r10=>0x0]}, &(0x7f000095dffc)=0x8)
getsockopt$inet_sctp6_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f0000000080)={r10}, &(0x7f00000000c0)=0x10)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={r10, 0x6}, &(0x7f0000000140)=0x8)

20:01:45 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480))
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r3 = dup3(r2, r0, 0x80000)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
r5 = fsmount(r4, 0x1, 0x48)
fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f00000000c0)='\\:(trusted\x00', 0x0, r5)
ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={<r6=>0xffffffffffffffff})
r7 = dup(r6)
setsockopt$SO_J1939_FILTER(r7, 0x6b, 0x1, &(0x7f0000000100)=[{0x3, 0x1, {0x3, 0xff, 0x2}, {0x3, 0x75, 0x5}, 0x1fe, 0x1}, {0x0, 0x0, {0x2, 0x1, 0x2}, {0x1, 0xaa40fd6c3d1d8710, 0x4}, 0xfe}], 0x40)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
r8 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a)
getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x0, 0x30}, &(0x7f0000000080)=0x18)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r9=>0xffffffffffffffff})
mmap$usbmon(&(0x7f0000012000/0x1000)=nil, 0x1000, 0x2, 0x100077, r9, 0x2a38000000000000)
r10 = dup2(r0, r8)
dup3(r10, r1, 0x0)

20:01:45 executing program 3 (fault-call:2 fault-nth:29):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:45 executing program 0:
pipe(&(0x7f0000000680))
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
dup(0xffffffffffffffff)
r1 = getpgrp(0x0)
capget(&(0x7f0000000000)={0x0, r1}, 0x0)
getpgid(0x0)
r2 = memfd_create(0x0, 0x5)
syz_open_dev$sndseq(0x0, 0x0, 0x1)
r3 = dup2(0xffffffffffffffff, r2)
ppoll(&(0x7f0000000200)=[{r3}], 0x1, &(0x7f0000000280), 0x0, 0x0)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = socket$kcm(0x11, 0xa, 0x300)
fcntl$getownex(r5, 0x10, &(0x7f0000000580))
r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
pipe(&(0x7f0000000240)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0)
fsetxattr$system_posix_acl(r6, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="00eb800000", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e", @ANYBLOB="aa1345f97e", @ANYRES32=0x0, @ANYRESHEX=r0], 0x7, 0x1)
r8 = socket(0xa, 0x3, 0x8)
ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4})
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r9=>0xffffffffffffffff}}}, 0x20)
sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0)
r10 = gettid()
waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480))
sendmsg$key(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r9, @ANYRESDEC=r10]], 0xfffffffffffffe56}}, 0x20004850)
memfd_create(0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
r11 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r11)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780))
kcmp(r11, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, <r12=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x9)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x0, 0x0, r12}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, r12}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r12}, 0xc)
r13 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x30000, 0x18f)
r14 = gettid()
capget(&(0x7f0000000040)={0x20071026, r14}, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=<r15=>0x0)
perf_event_open(0x0, r15, 0xe, r13, 0x8)
r16 = socket$inet(0x2, 0x4000000000000001, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffe)
bind$inet(r16, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r16, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r16, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10)
r17 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084)
socket$inet(0x2, 0x4000000000000001, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r18 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0)
pwritev(r18, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003)
ioctl$LOOP_CHANGE_FD(r17, 0x4c00, r18)
sendfile(r16, r17, 0x0, 0x102000004)

20:01:45 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r3)
stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
setregid(r3, r4)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000e4", 0x2b}], 0x1, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000000c0)="d28a62d3c565ed8c78cb2637bd8dd72a7e")
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc)
ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x4cc], 0x100000})
setsockopt$packet_int(r6, 0x107, 0x3, &(0x7f0000000100), 0x4)
ioctl$KVM_RUN(r8, 0xae80, 0x0)

20:01:45 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r1, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  703.368294][T12435] FAULT_INJECTION: forcing a failure.
[  703.368294][T12435] name failslab, interval 1, probability 0, space 0, times 0
[  703.381987][T12435] CPU: 0 PID: 12435 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  703.392414][T12435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  703.402566][T12435] Call Trace:
[  703.405883][T12435]  dump_stack+0x197/0x210
[  703.410242][T12435]  should_fail.cold+0xa/0x10
[  703.414987][T12435]  ? is_bpf_text_address+0xac/0x160
[  703.420838][T12435]  ? setup_fault_attr+0x220/0x220
[  703.425910][T12435]  __should_failslab+0x121/0x190
[  703.427841][T12437] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure
[  703.430963][T12435]  should_failslab+0x9/0x14
[  703.430980][T12435]  kmem_cache_alloc+0x47/0x710
[  703.430999][T12435]  ? lock_acquire+0x190/0x410
[  703.431020][T12435]  ? net_tx_action+0xd30/0xd30
[  703.431039][T12435]  skb_clone+0x154/0x3d0
[  703.431059][T12435]  dev_queue_xmit_nit+0x3a1/0xaa0
[  703.431089][T12435]  dev_hard_start_xmit+0xbb/0x9b0
[  703.431110][T12435]  ? validate_xmit_skb_list+0xfc/0x150
[  703.431140][T12435]  sch_direct_xmit+0x372/0xd30
[  703.485631][T12435]  ? dev_watchdog+0xca0/0xca0
[  703.490408][T12435]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  703.495975][T12435]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  703.501972][T12435]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  703.508353][T12435]  ? sfb_dequeue+0x421/0x4d0
[  703.512982][T12435]  __qdisc_run+0x4bf/0x1770
[  703.517499][T12435]  __dev_queue_xmit+0x1650/0x35c0
[  703.522534][T12435]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  703.527978][T12435]  ? mark_held_locks+0xf0/0xf0
[  703.532749][T12435]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  703.539001][T12435]  ? debug_smp_processor_id+0x33/0x18a
[  703.544555][T12435]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  703.550979][T12435]  ? rcu_read_lock_held_common+0xbd/0x130
[  703.556827][T12435]  dev_queue_xmit+0x18/0x20
[  703.561556][T12435]  ? dev_queue_xmit+0x18/0x20
[  703.566321][T12435]  neigh_direct_output+0x16/0x20
[  703.571250][T12435]  ip6_finish_output2+0x109a/0x25c0
[  703.576446][T12435]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  703.581990][T12435]  ? lock_downgrade+0x920/0x920
[  703.586836][T12435]  ? netif_rx_ni+0x670/0x670
[  703.591425][T12435]  ? __kasan_check_read+0x11/0x20
[  703.596452][T12435]  __ip6_finish_output+0x444/0xaa0
[  703.601551][T12435]  ? __ip6_finish_output+0x444/0xaa0
[  703.606838][T12435]  ip6_finish_output+0x38/0x1f0
[  703.611690][T12435]  ip6_output+0x25e/0x880
[  703.616020][T12435]  ? ip6_finish_output+0x1f0/0x1f0
[  703.621138][T12435]  ? __ip6_finish_output+0xaa0/0xaa0
[  703.626538][T12435]  ? ip6_make_skb+0x370/0x570
[  703.631425][T12435]  ? ip_reply_glue_bits+0xc0/0xc0
[  703.636581][T12435]  ip6_local_out+0xbb/0x1b0
[  703.641443][T12435]  ip6_send_skb+0xbb/0x350
[  703.646701][T12435]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  703.652891][T12435]  ? ip6_forward_finish+0x570/0x570
[  703.658250][T12435]  udpv6_sendmsg+0x22f3/0x2b30
[  703.663848][T12435]  ? __kasan_check_write+0x14/0x20
[  703.669131][T12435]  ? ip_reply_glue_bits+0xc0/0xc0
[  703.674196][T12435]  ? udp_v6_get_port+0x6b0/0x6b0
[  703.679270][T12435]  ? __kasan_check_read+0x11/0x20
[  703.684469][T12435]  ? mark_lock+0xc2/0x1220
[  703.688908][T12435]  ? __kasan_check_read+0x11/0x20
[  703.693930][T12435]  ? mark_lock+0xc2/0x1220
[  703.698434][T12435]  ? __kasan_check_read+0x11/0x20
[  703.703465][T12435]  ? ___might_sleep+0x163/0x2c0
[  703.708330][T12435]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  703.714049][T12435]  ? aa_sk_perm+0x346/0xb00
[  703.718574][T12435]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  703.724497][T12435]  inet6_sendmsg+0x9e/0xe0
[  703.728933][T12435]  ? inet6_sendmsg+0x9e/0xe0
[  703.733606][T12435]  ? inet6_ioctl+0x1c0/0x1c0
[  703.738191][T12435]  sock_sendmsg+0xd7/0x130
[  703.742726][T12435]  ____sys_sendmsg+0x358/0x880
[  703.747634][T12435]  ? kernel_sendmsg+0x50/0x50
[  703.752453][T12435]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  703.758022][T12435]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  703.764607][T12435]  ? find_held_lock+0x35/0x130
[  703.769649][T12435]  ___sys_sendmsg+0x100/0x170
[  703.774339][T12435]  ? sendmsg_copy_msghdr+0x70/0x70
[  703.779496][T12435]  ? __kasan_check_read+0x11/0x20
[  703.784538][T12435]  ? __might_fault+0x12b/0x1e0
[  703.789427][T12435]  ? find_held_lock+0x35/0x130
[  703.794204][T12435]  ? __might_fault+0x12b/0x1e0
[  703.799287][T12435]  ? do_dup2+0x4f0/0x4f0
[  703.803633][T12435]  ? lock_downgrade+0x920/0x920
[  703.808647][T12435]  ? ___might_sleep+0x163/0x2c0
[  703.813698][T12435]  __sys_sendmmsg+0x1bf/0x4d0
[  703.818950][T12435]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  703.824236][T12435]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  703.830928][T12435]  ? fput_many+0x12c/0x1a0
[  703.835368][T12435]  ? fput+0x1b/0x20
[  703.839185][T12435]  ? ksys_write+0x1cf/0x290
[  703.843889][T12435]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  703.849562][T12435]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  703.855046][T12435]  ? do_syscall_64+0x26/0x790
[  703.859733][T12435]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  703.866110][T12435]  ? do_syscall_64+0x26/0x790
[  703.870990][T12435]  __x64_sys_sendmmsg+0x9d/0x100
[  703.876480][T12435]  do_syscall_64+0xfa/0x790
[  703.881082][T12435]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  703.886970][T12435] RIP: 0033:0x45a919
[  703.890872][T12435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  703.910956][T12435] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  703.919395][T12435] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  703.927626][T12435] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  703.935872][T12435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  703.943935][T12435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  703.951997][T12435] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:46 executing program 3 (fault-call:2 fault-nth:30):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r3 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10)
sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0x7)

[  704.100186][T12438] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state.
[  704.226812][T12458] FAULT_INJECTION: forcing a failure.
[  704.226812][T12458] name failslab, interval 1, probability 0, space 0, times 0
[  704.240313][T12458] CPU: 0 PID: 12458 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  704.250319][T12458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  704.260390][T12458] Call Trace:
[  704.263831][T12458]  dump_stack+0x197/0x210
[  704.268317][T12458]  should_fail.cold+0xa/0x10
[  704.273162][T12458]  ? setup_fault_attr+0x220/0x220
[  704.278260][T12458]  ? ___might_sleep+0x163/0x2c0
[  704.283505][T12458]  __should_failslab+0x121/0x190
[  704.288484][T12458]  should_failslab+0x9/0x14
[  704.293172][T12458]  kmem_cache_alloc_node+0x268/0x740
[  704.298719][T12458]  ? __dev_queue_xmit+0x173f/0x35c0
[  704.304218][T12458]  ? trace_hardirqs_on+0x67/0x240
[  704.309641][T12458]  ? __dev_queue_xmit+0x173f/0x35c0
[  704.315127][T12458]  __alloc_skb+0xd5/0x5e0
[  704.319467][T12458]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  704.325114][T12458]  alloc_skb_with_frags+0x93/0x590
[  704.330230][T12458]  ? find_held_lock+0x35/0x130
[  704.334989][T12458]  sock_alloc_send_pskb+0x7ad/0x920
[  704.340360][T12458]  ? sock_wmalloc+0x120/0x120
[  704.345113][T12458]  ? __local_bh_enable_ip+0x15a/0x270
[  704.350775][T12458]  ? ip6_finish_output2+0x1106/0x25c0
[  704.356581][T12458]  ? ip6_mtu+0x2e6/0x450
[  704.361175][T12458]  ? find_held_lock+0x35/0x130
[  704.365933][T12458]  sock_alloc_send_skb+0x32/0x40
[  704.370864][T12458]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  704.376945][T12458]  ? ip_reply_glue_bits+0xc0/0xc0
[  704.382163][T12458]  ? ip6_setup_cork+0x1920/0x1920
[  704.387215][T12458]  ? ip6_flush_pending_frames+0xd0/0xd0
[  704.392771][T12458]  ? __kasan_check_read+0x11/0x20
[  704.397792][T12458]  ip6_make_skb+0x32f/0x570
[  704.402385][T12458]  ? ip_reply_glue_bits+0xc0/0xc0
[  704.408193][T12458]  ? ip_reply_glue_bits+0xc0/0xc0
[  704.413411][T12458]  ? ip6_push_pending_frames+0xf0/0xf0
[  704.419081][T12458]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  704.424649][T12458]  ? ip6_forward_finish+0x570/0x570
[  704.429838][T12458]  ? rcu_read_lock_held+0x9c/0xb0
[  704.434865][T12458]  udpv6_sendmsg+0x22a1/0x2b30
[  704.439712][T12458]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  704.446023][T12458]  ? ip_reply_glue_bits+0xc0/0xc0
[  704.451152][T12458]  ? udp_v6_get_port+0x6b0/0x6b0
[  704.456460][T12458]  ? __kasan_check_read+0x11/0x20
[  704.461498][T12458]  ? mark_lock+0xc2/0x1220
[  704.466037][T12458]  ? __kasan_check_read+0x11/0x20
[  704.471049][T12458]  ? mark_lock+0xc2/0x1220
[  704.475560][T12458]  ? __kasan_check_read+0x11/0x20
[  704.480806][T12458]  ? ___might_sleep+0x163/0x2c0
[  704.485661][T12458]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  704.491286][T12458]  ? aa_sk_perm+0x346/0xb00
[  704.495805][T12458]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  704.501347][T12458]  inet6_sendmsg+0x9e/0xe0
[  704.505766][T12458]  ? inet6_sendmsg+0x9e/0xe0
[  704.510435][T12458]  ? inet6_ioctl+0x1c0/0x1c0
[  704.515015][T12458]  sock_sendmsg+0xd7/0x130
[  704.519551][T12458]  ____sys_sendmsg+0x358/0x880
[  704.524311][T12458]  ? kernel_sendmsg+0x50/0x50
[  704.528979][T12458]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  704.534742][T12458]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  704.540740][T12458]  ? find_held_lock+0x35/0x130
[  704.545512][T12458]  ___sys_sendmsg+0x100/0x170
[  704.550200][T12458]  ? sendmsg_copy_msghdr+0x70/0x70
[  704.555300][T12458]  ? __kasan_check_read+0x11/0x20
[  704.560318][T12458]  ? __might_fault+0x12b/0x1e0
[  704.565092][T12458]  ? find_held_lock+0x35/0x130
[  704.569870][T12458]  ? __might_fault+0x12b/0x1e0
[  704.574646][T12458]  ? do_dup2+0x4f0/0x4f0
[  704.578995][T12458]  ? lock_downgrade+0x920/0x920
[  704.583862][T12458]  ? ___might_sleep+0x163/0x2c0
[  704.588704][T12458]  __sys_sendmmsg+0x1bf/0x4d0
[  704.593531][T12458]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  704.598664][T12458]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  704.605391][T12458]  ? fput_many+0x12c/0x1a0
[  704.609979][T12458]  ? fput+0x1b/0x20
[  704.613792][T12458]  ? ksys_write+0x1cf/0x290
[  704.618389][T12458]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  704.623853][T12458]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  704.629503][T12458]  ? do_syscall_64+0x26/0x790
[  704.634193][T12458]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  704.640386][T12458]  ? do_syscall_64+0x26/0x790
[  704.645066][T12458]  __x64_sys_sendmmsg+0x9d/0x100
[  704.650022][T12458]  do_syscall_64+0xfa/0x790
[  704.654561][T12458]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  704.660495][T12458] RIP: 0033:0x45a919
[  704.664960][T12458] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  704.685179][T12458] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  704.693681][T12458] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  704.702027][T12458] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  704.710094][T12458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  704.718274][T12458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  704.726414][T12458] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:01:46 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffe7d, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7, 0x0, 0xffffffffffffff9c}, 0x24)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0x4)
write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="83"], 0x1)
r3 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r4=>0x0}, &(0x7f0000cab000)=0xc)
setuid(r4)
write$ppp(r1, &(0x7f0000000500)='R', 0x1)
recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/16, 0x10}], 0x1}, 0x0)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x3a8)

20:01:47 executing program 3 (fault-call:2 fault-nth:31):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  704.928625][    C0] net_ratelimit: 12 callbacks suppressed
[  704.928632][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  704.940593][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  704.946428][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  704.952241][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  704.958106][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  704.964389][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  704.970454][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  704.976294][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:01:47 executing program 2:
openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0)
epoll_create1(0x80000)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x7, [0x200, 0x5, 0x5, 0xae, 0x5, 0x0, 0x1]}, &(0x7f0000000100)=0x12)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x11f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$dupfd(r2, 0x0, r1)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r5=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r5)
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r8, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRESHEX, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR64, @ANYPTR, @ANYPTR], @ANYRESHEX, @ANYRESHEX, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64=r5, @ANYRESDEC=r6, @ANYRES32=r8, @ANYRES64, @ANYPTR]]], 0x8)
ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f0000000140))
r9 = socket(0x10, 0x803, 0x0)
setsockopt$inet_mtu(r9, 0x0, 0xa, &(0x7f0000000240)=0xcf0823268f0ca4ea, 0x4)
syz_read_part_table(0x300000000000000, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005000000000e001400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])

20:01:47 executing program 0:
syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0)
fchdir(r0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f00000003c0))
r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x2)
ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000300)={0x9, {0x0, 0x7, 0xcd}})
r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r3 = open(0x0, 0x0, 0x0)
ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/227})
write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r2, r2, &(0x7f00000000c0)=0x500, 0x8080fffffffe)
r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00')
sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000200}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0x130, r5, 0x902, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xd3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x21eb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffc1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xff800000, @rand_addr="02b207684bfc298142921727d224d4f5", 0x33}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x49001}, 0x0)

[  705.113266][T12470] FAULT_INJECTION: forcing a failure.
[  705.113266][T12470] name failslab, interval 1, probability 0, space 0, times 0
[  705.191313][T12470] CPU: 0 PID: 12470 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  705.201253][T12470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  705.211363][T12470] Call Trace:
[  705.214709][T12470]  dump_stack+0x197/0x210
[  705.219069][T12470]  should_fail.cold+0xa/0x10
[  705.223683][T12470]  ? setup_fault_attr+0x220/0x220
[  705.223706][T12470]  ? ___might_sleep+0x163/0x2c0
[  705.223730][T12470]  __should_failslab+0x121/0x190
[  705.233778][T12470]  should_failslab+0x9/0x14
[  705.233797][T12470]  kmem_cache_alloc_node_trace+0x274/0x750
[  705.233815][T12470]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  705.233837][T12470]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  705.261136][T12470]  __kmalloc_node_track_caller+0x3d/0x70
[  705.266977][T12470]  __kmalloc_reserve.isra.0+0x40/0xf0
[  705.272380][T12470]  __alloc_skb+0x10b/0x5e0
[  705.276968][T12470]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  705.282558][T12470]  alloc_skb_with_frags+0x93/0x590
[  705.287692][T12470]  ? find_held_lock+0x35/0x130
[  705.292636][T12470]  sock_alloc_send_pskb+0x7ad/0x920
[  705.298225][T12470]  ? sock_wmalloc+0x120/0x120
[  705.302930][T12470]  ? __local_bh_enable_ip+0x15a/0x270
[  705.308335][T12470]  ? ip6_finish_output2+0x1106/0x25c0
[  705.314168][T12470]  ? ip6_mtu+0x2e6/0x450
[  705.318754][T12470]  ? find_held_lock+0x35/0x130
[  705.323565][T12470]  sock_alloc_send_skb+0x32/0x40
[  705.328546][T12470]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  705.334439][T12470]  ? ip_reply_glue_bits+0xc0/0xc0
[  705.339507][T12470]  ? ip6_setup_cork+0x1920/0x1920
[  705.344759][T12470]  ? ip6_flush_pending_frames+0xd0/0xd0
[  705.350324][T12470]  ? __kasan_check_read+0x11/0x20
[  705.355380][T12470]  ip6_make_skb+0x32f/0x570
[  705.359901][T12470]  ? ip_reply_glue_bits+0xc0/0xc0
[  705.365148][T12470]  ? ip_reply_glue_bits+0xc0/0xc0
[  705.370391][T12470]  ? ip6_push_pending_frames+0xf0/0xf0
[  705.375885][T12470]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  705.381465][T12470]  ? ip6_forward_finish+0x570/0x570
[  705.386810][T12470]  ? rcu_read_lock_held+0x9c/0xb0
[  705.392504][T12470]  udpv6_sendmsg+0x22a1/0x2b30
[  705.397387][T12470]  ? __kasan_check_write+0x14/0x20
[  705.402562][T12470]  ? ip_reply_glue_bits+0xc0/0xc0
[  705.407618][T12470]  ? udp_v6_get_port+0x6b0/0x6b0
[  705.412580][T12470]  ? __kasan_check_read+0x11/0x20
[  705.417637][T12470]  ? mark_lock+0xc2/0x1220
[  705.422379][T12470]  ? __kasan_check_read+0x11/0x20
[  705.428358][T12470]  ? mark_lock+0xc2/0x1220
[  705.432985][T12470]  ? __kasan_check_read+0x11/0x20
[  705.438050][T12470]  ? ___might_sleep+0x163/0x2c0
[  705.442935][T12470]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  705.448589][T12470]  ? aa_sk_perm+0x346/0xb00
[  705.453147][T12470]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  705.458729][T12470]  inet6_sendmsg+0x9e/0xe0
[  705.463175][T12470]  ? inet6_sendmsg+0x9e/0xe0
[  705.467797][T12470]  ? inet6_ioctl+0x1c0/0x1c0
[  705.472406][T12470]  sock_sendmsg+0xd7/0x130
[  705.476963][T12470]  ____sys_sendmsg+0x358/0x880
[  705.481741][T12470]  ? kernel_sendmsg+0x50/0x50
[  705.486446][T12470]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  705.492311][T12470]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  705.492327][T12470]  ? find_held_lock+0x35/0x130
[  705.492353][T12470]  ___sys_sendmsg+0x100/0x170
[  705.492372][T12470]  ? sendmsg_copy_msghdr+0x70/0x70
[  705.492397][T12470]  ? __kasan_check_read+0x11/0x20
[  705.503155][T12470]  ? __might_fault+0x12b/0x1e0
[  705.503173][T12470]  ? find_held_lock+0x35/0x130
[  705.503189][T12470]  ? __might_fault+0x12b/0x1e0
[  705.503207][T12470]  ? do_dup2+0x4f0/0x4f0
[  705.503230][T12470]  ? lock_downgrade+0x920/0x920
[  705.535590][   T27] audit: type=1804 audit(1577390507.301:63): pid=12476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir755456860/syzkaller.ym7LGg/111/file0/file0" dev="loop0" ino=120 res=1
[  705.539260][T12470]  ? ___might_sleep+0x163/0x2c0
[  705.539282][T12470]  __sys_sendmmsg+0x1bf/0x4d0
[  705.539301][T12470]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  705.539337][T12470]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  705.592031][T12470]  ? fput_many+0x12c/0x1a0
[  705.596987][T12470]  ? fput+0x1b/0x20
[  705.600812][T12470]  ? ksys_write+0x1cf/0x290
[  705.605737][T12470]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  705.611806][T12470]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  705.617358][T12470]  ? do_syscall_64+0x26/0x790
[  705.622242][T12470]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  705.628343][T12470]  ? do_syscall_64+0x26/0x790
[  705.633049][T12470]  __x64_sys_sendmmsg+0x9d/0x100
[  705.638090][T12470]  do_syscall_64+0xfa/0x790
[  705.642590][T12470]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  705.648482][T12470] RIP: 0033:0x45a919
[  705.652376][T12470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  705.674640][T12470] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  705.683169][T12470] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  705.692210][T12470] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  705.700261][T12470] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  705.709264][T12470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  705.721447][T12470] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  705.775041][T12480] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  705.785215][T12480] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  705.793507][T12480]  loop2: p2 < >
[  705.968612][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  705.974430][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  710.128684][    C0] net_ratelimit: 18 callbacks suppressed
[  710.134622][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  710.141323][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  711.168721][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  711.175062][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  711.180944][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  711.186711][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  711.192601][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  711.198365][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  711.204229][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  711.210464][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  715.328648][    C0] net_ratelimit: 12 callbacks suppressed
[  715.328657][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  715.340517][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  715.346335][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  715.352372][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  715.358389][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  715.364298][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  715.370207][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  715.375975][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  716.368634][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  716.374653][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:01:59 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700"/20, @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000c0e0100010005000000"], 0x3c}}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x10aec61bc6caa7b3}}, 0x20}}, 0x0)

20:01:59 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0)
r3 = socket$inet6_sctp(0xa, 0x1, 0x84)
r4 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r5=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000280)={r5}, &(0x7f00000002c0)=0x8)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000980)={0x51, 0x2, 0x8, 0xffffffc0, r5}, 0x10)
ioctl$KVM_SMI(r1, 0xaeb7)
writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1)

20:01:59 executing program 3 (fault-call:2 fault-nth:32):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:59 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x10)
mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000000)={{0x4, @addr=0x4}, 0x8, 0x1000, 0x9})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_open_procfs(0x0, &(0x7f0000272000))
keyctl$session_to_parent(0x12)

20:01:59 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r1, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:01:59 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
dup3(r2, r0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000300))
fcntl$setstatus(r0, 0x4, 0x44000)
r4 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0)
r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
ftruncate(r5, 0x8200)
getresuid(&(0x7f0000004180), 0x0, 0x0)
io_setup(0x40000000008, &(0x7f0000000240)=<r6=>0x0)
r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x28040, 0x0)
r8 = socket$nl_generic(0x10, 0x3, 0x10)
r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r9, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x800)
sendmsg$IPVS_CMD_DEL_DEST(r7, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r9, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40000002)
io_submit(r6, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000, 0x1200}])

[  717.256149][T12498] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
[  717.284818][T12500] FAULT_INJECTION: forcing a failure.
[  717.284818][T12500] name failslab, interval 1, probability 0, space 0, times 0
[  717.312447][T12500] CPU: 0 PID: 12500 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  717.317155][T12508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
[  717.324901][T12500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  717.324909][T12500] Call Trace:
[  717.324935][T12500]  dump_stack+0x197/0x210
[  717.324957][T12500]  should_fail.cold+0xa/0x10
[  717.324974][T12500]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  717.324992][T12500]  ? setup_fault_attr+0x220/0x220
[  717.325006][T12500]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  717.325031][T12500]  __should_failslab+0x121/0x190
[  717.377515][T12500]  should_failslab+0x9/0x14
[  717.382038][T12500]  kmem_cache_alloc+0x47/0x710
[  717.386843][T12500]  ? __kasan_check_read+0x11/0x20
[  717.392335][T12500]  skb_clone+0x154/0x3d0
[  717.396695][T12500]  ip6_finish_output2+0x18be/0x25c0
[  717.402180][T12500]  ? ip6_mtu+0x2e6/0x450
[  717.406443][T12500]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
20:01:59 executing program 2:
syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17, 0x1}], 0xc0ed0000, &(0x7f0000000040)={[{@fat=@usefree='usefree'}]})

20:01:59 executing program 0:
open(&(0x7f0000000040)='.\x00', 0x0, 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x1)
r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f0000000080)={<r3=>0x0, <r4=>0x0})
utimensat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{r3, r4/1000+10000}}, 0x0)
r5 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
write$apparmor_exec(r0, &(0x7f0000000880)={'\\C\x1b)\x0f\x0eBC\x9bMY\x1d\x9b8r\xc3\x16\xb1\x9b<my\xeaU\x0e3\\C6im\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\xbb\xec\xccT\x9e\xe0\xbaw3\xc4\x95\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[\x0fc\xb1\xd4y\xd4\xca=\f\xd0Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6\xa0ztl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\x139\xff\x01\x00\x00\x00\x00\x00\x00\xb7\rpRc\xc1\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xdf\x1d\x82\x9a\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\x05\x00\x00\x00\x00\x00\x00\x00S\xe6\x12\x9f\r\xed\xb8\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\xf3mq\xbb\x0f\xa8ct\x1fT\x1e\x8c\x9cT\xb8jy\xac\xcc\xf6B\xde\xcb\xb6}\x80\x94v\xd7\x8a\xe6\xd6\xa08\x1d\xa8\xef\x8f\xcf\xec\x8cG\x81\xde\f\xb0\xc1\xf2n\x9c\x04\xa5@\x9d\xaa\t\x9eE\xefE\x0e\x84\xf1`\x8b\r\x02Z\\3\xe5\xf1,', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1b]\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00]LD\xef\xf1Jg\xb9a\xe7\xe2k\xc6\x11\x8d>\x80\x9f\xddZ\xb3\xe5\xc8\x04s\xe6E\xfbQ\x0f\x82\x13\xdfP\xcc\xb3\xba\"\x18}\x04GxG\xeeN\xac\xc05`'}, 0x2c1)

[  717.412057][T12500]  ? lock_downgrade+0x920/0x920
[  717.417032][T12500]  ? rcu_read_lock_held+0x9c/0xb0
[  717.422359][T12500]  ? __kasan_check_read+0x11/0x20
[  717.428099][T12500]  __ip6_finish_output+0x444/0xaa0
[  717.433964][T12500]  ? __ip6_finish_output+0x444/0xaa0
[  717.439276][T12500]  ip6_finish_output+0x38/0x1f0
[  717.444241][T12500]  ip6_output+0x25e/0x880
[  717.448677][T12500]  ? ip6_finish_output+0x1f0/0x1f0
[  717.448698][T12500]  ? __ip6_finish_output+0xaa0/0xaa0
[  717.448717][T12500]  ? ip6_make_skb+0x370/0x570
[  717.459595][T12500]  ? ip_reply_glue_bits+0xc0/0xc0
[  717.459617][T12500]  ip6_local_out+0xbb/0x1b0
[  717.459636][T12500]  ip6_send_skb+0xbb/0x350
[  717.459657][T12500]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  717.459677][T12500]  ? ip6_forward_finish+0x570/0x570
[  717.474179][T12500]  udpv6_sendmsg+0x22f3/0x2b30
[  717.495267][T12500]  ? __kasan_check_write+0x14/0x20
[  717.495286][T12500]  ? ip_reply_glue_bits+0xc0/0xc0
[  717.495310][T12500]  ? udp_v6_get_port+0x6b0/0x6b0
[  717.501337][T12511] FAT-fs (loop2): bogus number of reserved sectors
[  717.506186][T12500]  ? __kasan_check_read+0x11/0x20
[  717.506202][T12500]  ? mark_lock+0xc2/0x1220
[  717.506222][T12500]  ? __kasan_check_read+0x11/0x20
[  717.506241][T12500]  ? mark_lock+0xc2/0x1220
[  717.538637][T12500]  ? __kasan_check_read+0x11/0x20
[  717.540542][T12511] FAT-fs (loop2): Can't find a valid FAT filesystem
[  717.543702][T12500]  ? ___might_sleep+0x163/0x2c0
[  717.543729][T12500]  ? debug_lockdep_rcu_enabled+0x71/0xa0
20:01:59 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001480)='/dev/sequencer2\x00', 0x40, 0x0)
ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000014c0)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x4000, 0x1})
r1 = fcntl$getown(0xffffffffffffffff, 0x9)
r2 = fcntl$getown(0xffffffffffffffff, 0x9)
openat$urandom(0xffffffffffffff9c, &(0x7f0000001440)='/dev/urandom\x00', 0x80402, 0x0)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r2, 0x4, 0xffffffffffffffff, 0x8)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x8, 0x1}, 0x0, 0x0, &(0x7f0000000200)={0x1, 0xb, 0x8000, 0xfffffff9}, &(0x7f0000000240)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x6}}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001400)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)='\x00\x00\x00\x00 \x00\x00\x7f\x88\x00', r3}, 0x30)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r1, 0x4, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x9, 0x5, 0x3, 0x0, 0x0, 0x45, 0x40040, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x3, @perf_config_ext={0x0, 0x8}, 0x80, 0x5, 0xfffffffa, 0x1, 0x8, 0x1}, r1, 0x9, 0xffffffffffffffff, 0x1)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='\x00\x00\x00\x00 \x00\x00\x7f\x88\x00', 0x4400, 0x0)
preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0xffc00}], 0x1, 0x0)

[  717.543744][T12500]  ? aa_sk_perm+0x346/0xb00
[  717.543774][T12500]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  717.572682][T12500]  inet6_sendmsg+0x9e/0xe0
[  717.572700][T12500]  ? inet6_sendmsg+0x9e/0xe0
[  717.572718][T12500]  ? inet6_ioctl+0x1c0/0x1c0
[  717.572734][T12500]  sock_sendmsg+0xd7/0x130
[  717.572751][T12500]  ____sys_sendmsg+0x358/0x880
[  717.572770][T12500]  ? kernel_sendmsg+0x50/0x50
20:01:59 executing program 3 (fault-call:2 fault-nth:33):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:01:59 executing program 2:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x4000)=nil, 0x21, 0x0, 0x11, 0xffffffffffffffff, 0x0)
r0 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r2 = dup2(r1, 0xffffffffffffffff)
write$FUSE_DIRENT(r2, &(0x7f0000000200)={0xe0, 0x1ad0bb9e69fde931, 0x4, [{0x1, 0x2, 0x3, 0x3f, 'syz'}, {0x2, 0x3ce2, 0x3, 0x100, 'syz'}, {0x5, 0x2f67, 0x8, 0x8, 'big_key\x00'}, {0x6, 0x859, 0x1, 0x7, '{'}, {0x0, 0x3, 0x11, 0x7f, 'lomime_typevmnet0'}, {0x5, 0x98, 0x3, 0x2, 'syz'}]}, 0xe0)
keyctl$revoke(0x3, r0)
dup(0xffffffffffffffff)
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)

[  717.572788][T12500]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  717.572805][T12500]  ? rcu_read_lock_any_held.part.0+0x50/0x50
20:01:59 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x6}, 0x16, 0x4)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x100000100}, 0x1, 0x0, 0x0, 0x200010d0}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r5}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0)

[  717.572819][T12500]  ? find_held_lock+0x35/0x130
[  717.572845][T12500]  ___sys_sendmsg+0x100/0x170
[  717.572864][T12500]  ? sendmsg_copy_msghdr+0x70/0x70
[  717.572882][T12500]  ? __kasan_check_read+0x11/0x20
[  717.572902][T12500]  ? __might_fault+0x12b/0x1e0
[  717.572917][T12500]  ? find_held_lock+0x35/0x130
[  717.572934][T12500]  ? __might_fault+0x12b/0x1e0
[  717.572952][T12500]  ? do_dup2+0x4f0/0x4f0
[  717.572979][T12500]  ? lock_downgrade+0x920/0x920
[  717.573007][T12500]  ? ___might_sleep+0x163/0x2c0
[  717.573028][T12500]  __sys_sendmmsg+0x1bf/0x4d0
[  717.573046][T12500]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  717.573084][T12500]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  717.573101][T12500]  ? fput_many+0x12c/0x1a0
[  717.573118][T12500]  ? fput+0x1b/0x20
[  717.573133][T12500]  ? ksys_write+0x1cf/0x290
[  717.573155][T12500]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  717.573172][T12500]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  717.573188][T12500]  ? do_syscall_64+0x26/0x790
[  717.573203][T12500]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  717.573217][T12500]  ? do_syscall_64+0x26/0x790
[  717.573236][T12500]  __x64_sys_sendmmsg+0x9d/0x100
[  717.573254][T12500]  do_syscall_64+0xfa/0x790
[  717.573273][T12500]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  717.573284][T12500] RIP: 0033:0x45a919
[  717.573300][T12500] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  717.573308][T12500] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  717.573324][T12500] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  717.573333][T12500] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  717.573341][T12500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  717.573350][T12500] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  717.573360][T12500] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  717.653938][T12511] FAT-fs (loop2): bogus number of reserved sectors
[  717.653952][T12511] FAT-fs (loop2): Can't find a valid FAT filesystem
[  717.905156][T12533] FAULT_INJECTION: forcing a failure.
[  717.905156][T12533] name failslab, interval 1, probability 0, space 0, times 0
[  717.928010][T12533] CPU: 1 PID: 12533 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  717.987868][T12533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  717.987876][T12533] Call Trace:
[  717.987896][T12533]  dump_stack+0x197/0x210
[  717.987922][T12533]  should_fail.cold+0xa/0x10
[  718.021878][T12533]  ? is_bpf_text_address+0xac/0x160
[  718.021897][T12533]  ? setup_fault_attr+0x220/0x220
[  718.021923][T12533]  __should_failslab+0x121/0x190
[  718.038449][T12533]  should_failslab+0x9/0x14
[  718.038464][T12533]  kmem_cache_alloc+0x47/0x710
[  718.038480][T12533]  ? lock_acquire+0x190/0x410
[  718.038508][T12533]  ? net_tx_action+0xd30/0xd30
[  718.054440][T12533]  skb_clone+0x154/0x3d0
[  718.054462][T12533]  dev_queue_xmit_nit+0x3a1/0xaa0
[  718.054487][T12533]  dev_hard_start_xmit+0xbb/0x9b0
[  718.070442][T12533]  ? validate_xmit_skb_list+0xfc/0x150
[  718.070466][T12533]  sch_direct_xmit+0x372/0xd30
[  718.070488][T12533]  ? dev_watchdog+0xca0/0xca0
[  718.070510][T12533]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  718.070525][T12533]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  718.070543][T12533]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  718.070554][T12533]  ? sfb_dequeue+0x421/0x4d0
[  718.070576][T12533]  __qdisc_run+0x4bf/0x1770
[  718.083657][T12533]  __dev_queue_xmit+0x1650/0x35c0
[  718.083686][T12533]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  718.083711][T12533]  ? mark_held_locks+0xf0/0xf0
[  718.083729][T12533]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  718.083752][T12533]  ? debug_smp_processor_id+0x33/0x18a
20:02:00 executing program 2:
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', <r1=>0x0})
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@setlink={0x50, 0x13, 0x41d, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x30, 0x16, [{0x2c, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x81000000}}]}]}]}, 0x50}}, 0x0)
lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '/(\x00'})

[  718.106382][T12533]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  718.106402][T12533]  ? rcu_read_lock_held_common+0xbd/0x130
[  718.106426][T12533]  dev_queue_xmit+0x18/0x20
[  718.106441][T12533]  ? dev_queue_xmit+0x18/0x20
[  718.106457][T12533]  neigh_direct_output+0x16/0x20
[  718.106472][T12533]  ip6_finish_output2+0x109a/0x25c0
[  718.106503][T12533]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  718.125846][T12533]  ? lock_downgrade+0x920/0x920
[  718.135657][T12533]  ? netif_rx_ni+0x670/0x670
20:02:00 executing program 3 (fault-call:2 fault-nth:34):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  718.135677][T12533]  ? __kasan_check_read+0x11/0x20
[  718.135702][T12533]  __ip6_finish_output+0x444/0xaa0
[  718.156616][T12533]  ? __ip6_finish_output+0x444/0xaa0
[  718.156643][T12533]  ip6_finish_output+0x38/0x1f0
[  718.156661][T12533]  ip6_output+0x25e/0x880
[  718.156682][T12533]  ? ip6_finish_output+0x1f0/0x1f0
[  718.156703][T12533]  ? __ip6_finish_output+0xaa0/0xaa0
[  718.175641][T12533]  ? ip6_make_skb+0x370/0x570
[  718.175663][T12533]  ? ip_reply_glue_bits+0xc0/0xc0
[  718.175687][T12533]  ip6_local_out+0xbb/0x1b0
[  718.175712][T12533]  ip6_send_skb+0xbb/0x350
[  718.196263][T12533]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  718.196281][T12533]  ? ip6_forward_finish+0x570/0x570
[  718.196311][T12533]  udpv6_sendmsg+0x22f3/0x2b30
[  718.196328][T12533]  ? __kasan_check_write+0x14/0x20
[  718.196350][T12533]  ? ip_reply_glue_bits+0xc0/0xc0
[  718.208581][T12533]  ? udp_v6_get_port+0x6b0/0x6b0
[  718.208599][T12533]  ? __kasan_check_read+0x11/0x20
[  718.208615][T12533]  ? mark_lock+0xc2/0x1220
[  718.208637][T12533]  ? __kasan_check_read+0x11/0x20
[  718.208648][T12533]  ? mark_lock+0xc2/0x1220
[  718.208661][T12533]  ? __kasan_check_read+0x11/0x20
[  718.208684][T12533]  ? ___might_sleep+0x163/0x2c0
[  718.208706][T12533]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  718.208722][T12533]  ? aa_sk_perm+0x346/0xb00
[  718.208753][T12533]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  718.208777][T12533]  inet6_sendmsg+0x9e/0xe0
[  718.220554][T12533]  ? inet6_sendmsg+0x9e/0xe0
[  718.220571][T12533]  ? inet6_ioctl+0x1c0/0x1c0
[  718.220587][T12533]  sock_sendmsg+0xd7/0x130
[  718.220605][T12533]  ____sys_sendmsg+0x358/0x880
[  718.220624][T12533]  ? kernel_sendmsg+0x50/0x50
[  718.220641][T12533]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  718.220657][T12533]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  718.220670][T12533]  ? find_held_lock+0x35/0x130
[  718.220698][T12533]  ___sys_sendmsg+0x100/0x170
[  718.230990][T12533]  ? sendmsg_copy_msghdr+0x70/0x70
[  718.231011][T12533]  ? __kasan_check_read+0x11/0x20
[  718.231032][T12533]  ? __might_fault+0x12b/0x1e0
[  718.231054][T12533]  ? find_held_lock+0x35/0x130
[  718.241081][T12533]  ? __might_fault+0x12b/0x1e0
[  718.241100][T12533]  ? do_dup2+0x4f0/0x4f0
[  718.241121][T12533]  ? lock_downgrade+0x920/0x920
[  718.241148][T12533]  ? ___might_sleep+0x163/0x2c0
[  718.241171][T12533]  __sys_sendmmsg+0x1bf/0x4d0
[  718.241193][T12533]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  718.241228][T12533]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  718.241245][T12533]  ? fput_many+0x12c/0x1a0
[  718.241265][T12533]  ? fput+0x1b/0x20
[  718.253148][T12533]  ? ksys_write+0x1cf/0x290
[  718.253245][T12533]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  718.253271][T12533]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  718.253291][T12533]  ? do_syscall_64+0x26/0x790
[  718.253307][T12533]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  718.253320][T12533]  ? do_syscall_64+0x26/0x790
[  718.253346][T12533]  __x64_sys_sendmmsg+0x9d/0x100
[  718.266215][T12533]  do_syscall_64+0xfa/0x790
[  718.266238][T12533]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  718.266251][T12533] RIP: 0033:0x45a919
[  718.266269][T12533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  718.266277][T12533] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  718.266298][T12533] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  718.275567][T12533] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  718.275577][T12533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  718.275585][T12533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  718.275593][T12533] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  718.397468][T12544] FAULT_INJECTION: forcing a failure.
[  718.397468][T12544] name failslab, interval 1, probability 0, space 0, times 0
[  718.414987][T12544] CPU: 1 PID: 12544 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  718.426861][T12544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  718.466953][T12544] Call Trace:
[  718.466975][T12544]  dump_stack+0x197/0x210
[  718.466999][T12544]  should_fail.cold+0xa/0x10
[  718.477749][T12544]  ? setup_fault_attr+0x220/0x220
[  718.477777][T12544]  ? ___might_sleep+0x163/0x2c0
[  718.487552][T12544]  __should_failslab+0x121/0x190
[  718.487577][T12544]  should_failslab+0x9/0x14
[  718.497477][T12544]  kmem_cache_alloc_node+0x268/0x740
[  718.497495][T12544]  ? __dev_queue_xmit+0x173f/0x35c0
[  718.497511][T12544]  ? trace_hardirqs_on+0x67/0x240
[  718.497533][T12544]  ? __dev_queue_xmit+0x173f/0x35c0
[  718.507044][T12544]  __alloc_skb+0xd5/0x5e0
[  718.507071][T12544]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  718.519880][T12544]  alloc_skb_with_frags+0x93/0x590
[  718.519897][T12544]  ? find_held_lock+0x35/0x130
[  718.519919][T12544]  sock_alloc_send_pskb+0x7ad/0x920
[  718.519944][T12544]  ? sock_wmalloc+0x120/0x120
[  718.519959][T12544]  ? __local_bh_enable_ip+0x15a/0x270
[  718.519975][T12544]  ? ip6_finish_output2+0x1106/0x25c0
[  718.519994][T12544]  ? ip6_mtu+0x2e6/0x450
[  718.529508][T12544]  ? find_held_lock+0x35/0x130
[  718.529530][T12544]  sock_alloc_send_skb+0x32/0x40
[  718.529550][T12544]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  718.529578][T12544]  ? ip_reply_glue_bits+0xc0/0xc0
[  718.540929][T12544]  ? ip6_setup_cork+0x1920/0x1920
[  718.540946][T12544]  ? ip6_flush_pending_frames+0xd0/0xd0
[  718.540962][T12544]  ? __kasan_check_read+0x11/0x20
[  718.540979][T12544]  ip6_make_skb+0x32f/0x570
[  718.540991][T12544]  ? ip_reply_glue_bits+0xc0/0xc0
[  718.541010][T12544]  ? ip_reply_glue_bits+0xc0/0xc0
[  718.549826][T12544]  ? ip6_push_pending_frames+0xf0/0xf0
[  718.549846][T12544]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  718.549863][T12544]  ? ip6_forward_finish+0x570/0x570
[  718.549877][T12544]  ? rcu_read_lock_held+0x9c/0xb0
[  718.549901][T12544]  udpv6_sendmsg+0x22a1/0x2b30
[  718.559864][T12544]  ? __kasan_check_write+0x14/0x20
[  718.559881][T12544]  ? ip_reply_glue_bits+0xc0/0xc0
[  718.559905][T12544]  ? udp_v6_get_port+0x6b0/0x6b0
[  718.559919][T12544]  ? __kasan_check_read+0x11/0x20
[  718.559931][T12544]  ? mark_lock+0xc2/0x1220
[  718.559952][T12544]  ? __kasan_check_read+0x11/0x20
[  718.570170][T12544]  ? mark_lock+0xc2/0x1220
[  718.570185][T12544]  ? __kasan_check_read+0x11/0x20
[  718.570206][T12544]  ? ___might_sleep+0x163/0x2c0
[  718.570229][T12544]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  718.570245][T12544]  ? aa_sk_perm+0x346/0xb00
[  718.570278][T12544]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  718.580994][T12544]  inet6_sendmsg+0x9e/0xe0
[  718.581009][T12544]  ? inet6_sendmsg+0x9e/0xe0
[  718.581025][T12544]  ? inet6_ioctl+0x1c0/0x1c0
[  718.581040][T12544]  sock_sendmsg+0xd7/0x130
[  718.581054][T12544]  ____sys_sendmsg+0x358/0x880
[  718.581073][T12544]  ? kernel_sendmsg+0x50/0x50
[  718.590536][T12544]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  718.590553][T12544]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  718.590566][T12544]  ? find_held_lock+0x35/0x130
[  718.590588][T12544]  ___sys_sendmsg+0x100/0x170
[  718.590607][T12544]  ? sendmsg_copy_msghdr+0x70/0x70
[  718.600380][T12544]  ? __kasan_check_read+0x11/0x20
[  718.600400][T12544]  ? __might_fault+0x12b/0x1e0
[  718.600414][T12544]  ? find_held_lock+0x35/0x130
[  718.600429][T12544]  ? __might_fault+0x12b/0x1e0
[  718.600446][T12544]  ? do_dup2+0x4f0/0x4f0
[  718.600462][T12544]  ? lock_downgrade+0x920/0x920
[  718.600489][T12544]  ? ___might_sleep+0x163/0x2c0
[  718.628528][T12544]  __sys_sendmmsg+0x1bf/0x4d0
[  718.628550][T12544]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  718.628588][T12544]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  718.628607][T12544]  ? fput_many+0x12c/0x1a0
[  718.628631][T12544]  ? fput+0x1b/0x20
[  718.644588][T12544]  ? ksys_write+0x1cf/0x290
[  718.644610][T12544]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  718.644624][T12544]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  718.644639][T12544]  ? do_syscall_64+0x26/0x790
[  718.644653][T12544]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  718.644667][T12544]  ? do_syscall_64+0x26/0x790
[  718.644685][T12544]  __x64_sys_sendmmsg+0x9d/0x100
[  718.644707][T12544]  do_syscall_64+0xfa/0x790
20:02:01 executing program 3 (fault-call:2 fault-nth:35):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  719.094776][T12544]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  719.094788][T12544] RIP: 0033:0x45a919
[  719.094803][T12544] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
20:02:01 executing program 3 (fault-call:2 fault-nth:36):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  719.094811][T12544] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  719.094824][T12544] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  719.094833][T12544] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  719.094842][T12544] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  719.094851][T12544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  719.094860][T12544] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  719.171436][T12550] FAULT_INJECTION: forcing a failure.
[  719.171436][T12550] name failslab, interval 1, probability 0, space 0, times 0
[  719.171459][T12550] CPU: 1 PID: 12550 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  719.171469][T12550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  719.171474][T12550] Call Trace:
[  719.171494][T12550]  dump_stack+0x197/0x210
[  719.171525][T12550]  should_fail.cold+0xa/0x10
[  719.171550][T12550]  ? setup_fault_attr+0x220/0x220
[  719.171576][T12550]  ? ___might_sleep+0x163/0x2c0
[  719.171600][T12550]  __should_failslab+0x121/0x190
[  719.171626][T12550]  should_failslab+0x9/0x14
[  719.171642][T12550]  kmem_cache_alloc_node_trace+0x274/0x750
[  719.171661][T12550]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  719.171677][T12550]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  719.171700][T12550]  __kmalloc_node_track_caller+0x3d/0x70
[  719.171728][T12550]  __kmalloc_reserve.isra.0+0x40/0xf0
[  719.171748][T12550]  __alloc_skb+0x10b/0x5e0
[  719.171771][T12550]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  719.171794][T12550]  alloc_skb_with_frags+0x93/0x590
[  719.171811][T12550]  ? find_held_lock+0x35/0x130
[  719.171836][T12550]  sock_alloc_send_pskb+0x7ad/0x920
[  719.171867][T12550]  ? sock_wmalloc+0x120/0x120
[  719.171883][T12550]  ? __local_bh_enable_ip+0x15a/0x270
[  719.171899][T12550]  ? ip6_finish_output2+0x1106/0x25c0
[  719.171912][T12550]  ? ip6_mtu+0x2e6/0x450
[  719.171926][T12550]  ? find_held_lock+0x35/0x130
[  719.171950][T12550]  sock_alloc_send_skb+0x32/0x40
[  719.171968][T12550]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  719.171998][T12550]  ? ip_reply_glue_bits+0xc0/0xc0
[  719.172026][T12550]  ? ip6_setup_cork+0x1920/0x1920
[  719.172043][T12550]  ? ip6_flush_pending_frames+0xd0/0xd0
[  719.172055][T12550]  ? __kasan_check_read+0x11/0x20
[  719.172073][T12550]  ip6_make_skb+0x32f/0x570
[  719.172087][T12550]  ? ip_reply_glue_bits+0xc0/0xc0
[  719.172107][T12550]  ? ip_reply_glue_bits+0xc0/0xc0
[  719.172125][T12550]  ? ip6_push_pending_frames+0xf0/0xf0
[  719.172145][T12550]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  719.172163][T12550]  ? ip6_forward_finish+0x570/0x570
[  719.172177][T12550]  ? rcu_read_lock_held+0x9c/0xb0
[  719.172201][T12550]  udpv6_sendmsg+0x22a1/0x2b30
[  719.172216][T12550]  ? __kasan_check_write+0x14/0x20
[  719.172231][T12550]  ? ip_reply_glue_bits+0xc0/0xc0
[  719.172255][T12550]  ? udp_v6_get_port+0x6b0/0x6b0
[  719.172268][T12550]  ? __kasan_check_read+0x11/0x20
[  719.172282][T12550]  ? mark_lock+0xc2/0x1220
[  719.172303][T12550]  ? __kasan_check_read+0x11/0x20
[  719.172317][T12550]  ? mark_lock+0xc2/0x1220
[  719.172331][T12550]  ? __kasan_check_read+0x11/0x20
[  719.172352][T12550]  ? ___might_sleep+0x163/0x2c0
[  719.172375][T12550]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  719.172393][T12550]  ? aa_sk_perm+0x346/0xb00
[  719.172427][T12550]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  719.172451][T12550]  inet6_sendmsg+0x9e/0xe0
[  719.172468][T12550]  ? inet6_sendmsg+0x9e/0xe0
[  719.172485][T12550]  ? inet6_ioctl+0x1c0/0x1c0
[  719.172500][T12550]  sock_sendmsg+0xd7/0x130
[  719.172517][T12550]  ____sys_sendmsg+0x358/0x880
[  719.172536][T12550]  ? kernel_sendmsg+0x50/0x50
[  719.172552][T12550]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  719.172569][T12550]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  719.172583][T12550]  ? find_held_lock+0x35/0x130
[  719.172608][T12550]  ___sys_sendmsg+0x100/0x170
[  719.172635][T12550]  ? sendmsg_copy_msghdr+0x70/0x70
[  719.172653][T12550]  ? __kasan_check_read+0x11/0x20
[  719.172675][T12550]  ? __might_fault+0x12b/0x1e0
[  719.172691][T12550]  ? find_held_lock+0x35/0x130
[  719.172709][T12550]  ? __might_fault+0x12b/0x1e0
[  719.172733][T12550]  ? do_dup2+0x4f0/0x4f0
[  719.172752][T12550]  ? lock_downgrade+0x920/0x920
[  719.172780][T12550]  ? ___might_sleep+0x163/0x2c0
[  719.172800][T12550]  __sys_sendmmsg+0x1bf/0x4d0
[  719.172823][T12550]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  719.172865][T12550]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  719.172882][T12550]  ? fput_many+0x12c/0x1a0
[  719.172899][T12550]  ? fput+0x1b/0x20
[  719.172915][T12550]  ? ksys_write+0x1cf/0x290
[  719.172935][T12550]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  719.172952][T12550]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  719.172969][T12550]  ? do_syscall_64+0x26/0x790
[  719.172984][T12550]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  719.172999][T12550]  ? do_syscall_64+0x26/0x790
[  719.173020][T12550]  __x64_sys_sendmmsg+0x9d/0x100
[  719.173042][T12550]  do_syscall_64+0xfa/0x790
[  719.173060][T12550]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  719.173073][T12550] RIP: 0033:0x45a919
[  719.173091][T12550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  719.173098][T12550] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  719.173114][T12550] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  719.173125][T12550] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  719.173134][T12550] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  719.173143][T12550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  719.173152][T12550] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  719.250467][T12557] FAULT_INJECTION: forcing a failure.
[  719.250467][T12557] name failslab, interval 1, probability 0, space 0, times 0
[  719.267021][T12557] CPU: 1 PID: 12557 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  719.274977][T12557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  719.274989][T12557] Call Trace:
[  719.284890][T12557]  dump_stack+0x197/0x210
[  719.295635][T12557]  should_fail.cold+0xa/0x10
[  719.307405][T12557]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  719.318653][T12557]  ? setup_fault_attr+0x220/0x220
[  719.318671][T12557]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  719.318697][T12557]  __should_failslab+0x121/0x190
[  719.318724][T12557]  should_failslab+0x9/0x14
[  719.328836][T12557]  kmem_cache_alloc+0x47/0x710
[  719.328851][T12557]  ? __kasan_check_read+0x11/0x20
[  719.328873][T12557]  skb_clone+0x154/0x3d0
[  719.328890][T12557]  ip6_finish_output2+0x18be/0x25c0
[  719.328904][T12557]  ? ip6_mtu+0x2e6/0x450
[  719.328924][T12557]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  719.328937][T12557]  ? lock_downgrade+0x920/0x920
[  719.328954][T12557]  ? rcu_read_lock_held+0x9c/0xb0
[  719.328973][T12557]  ? __kasan_check_read+0x11/0x20
[  719.339008][T12557]  __ip6_finish_output+0x444/0xaa0
[  719.339024][T12557]  ? __ip6_finish_output+0x444/0xaa0
[  719.339043][T12557]  ip6_finish_output+0x38/0x1f0
[  719.339057][T12557]  ip6_output+0x25e/0x880
[  719.339077][T12557]  ? ip6_finish_output+0x1f0/0x1f0
[  719.349128][T12557]  ? __ip6_finish_output+0xaa0/0xaa0
[  719.349141][T12557]  ? ip6_make_skb+0x370/0x570
[  719.349157][T12557]  ? ip_reply_glue_bits+0xc0/0xc0
[  719.349177][T12557]  ip6_local_out+0xbb/0x1b0
[  719.349198][T12557]  ip6_send_skb+0xbb/0x350
[  719.360206][T12557]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  719.360222][T12557]  ? ip6_forward_finish+0x570/0x570
[  719.360246][T12557]  udpv6_sendmsg+0x22f3/0x2b30
[  719.360261][T12557]  ? finish_task_switch+0x147/0x750
[  719.360277][T12557]  ? ip_reply_glue_bits+0xc0/0xc0
[  719.360298][T12557]  ? udp_v6_get_port+0x6b0/0x6b0
[  719.360318][T12557]  ? lockdep_hardirqs_on+0x421/0x5e0
[  719.390380][T12557]  ? __kasan_check_read+0x11/0x20
[  719.400932][T12557]  ? mark_lock+0xc2/0x1220
[  719.400945][T12557]  ? finish_task_switch+0x147/0x750
[  719.400956][T12557]  ? finish_task_switch+0x119/0x750
[  719.400975][T12557]  ? ___might_sleep+0x163/0x2c0
[  719.401002][T12557]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  719.401018][T12557]  ? aa_sk_perm+0x346/0xb00
[  719.401052][T12557]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  719.401077][T12557]  inet6_sendmsg+0x9e/0xe0
[  719.426610][T12557]  ? inet6_sendmsg+0x9e/0xe0
[  719.437032][T12557]  ? inet6_ioctl+0x1c0/0x1c0
[  719.446885][T12557]  sock_sendmsg+0xd7/0x130
[  719.457118][T12557]  ____sys_sendmsg+0x358/0x880
[  719.466557][T12557]  ? kernel_sendmsg+0x50/0x50
[  719.475980][T12557]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  719.485846][T12557]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  719.496382][T12557]  ? find_held_lock+0x35/0x130
[  720.016382][T12557]  ___sys_sendmsg+0x100/0x170
[  720.016400][T12557]  ? sendmsg_copy_msghdr+0x70/0x70
[  720.016415][T12557]  ? __kasan_check_read+0x11/0x20
[  720.016433][T12557]  ? __might_fault+0x12b/0x1e0
[  720.016448][T12557]  ? find_held_lock+0x35/0x130
[  720.016463][T12557]  ? __might_fault+0x12b/0x1e0
[  720.016480][T12557]  ? do_dup2+0x4f0/0x4f0
[  720.016496][T12557]  ? lock_downgrade+0x920/0x920
[  720.016521][T12557]  ? ___might_sleep+0x163/0x2c0
[  720.016539][T12557]  __sys_sendmmsg+0x1bf/0x4d0
[  720.016558][T12557]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  720.016594][T12557]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  720.016610][T12557]  ? fput_many+0x12c/0x1a0
[  720.016627][T12557]  ? fput+0x1b/0x20
[  720.016640][T12557]  ? ksys_write+0x1cf/0x290
[  720.016663][T12557]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  720.093541][T12557]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  720.093556][T12557]  ? do_syscall_64+0x26/0x790
[  720.093571][T12557]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  720.093586][T12557]  ? do_syscall_64+0x26/0x790
[  720.093606][T12557]  __x64_sys_sendmmsg+0x9d/0x100
[  720.093626][T12557]  do_syscall_64+0xfa/0x790
[  720.093644][T12557]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  720.093655][T12557] RIP: 0033:0x45a919
[  720.093671][T12557] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  720.093679][T12557] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  720.093693][T12557] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  720.093701][T12557] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  720.093709][T12557] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  720.093718][T12557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  720.093727][T12557] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:02:02 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(0xffffffffffffffff, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  720.528716][    C0] net_ratelimit: 18 callbacks suppressed
[  720.528724][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  720.540171][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  721.728733][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  721.734628][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  721.740544][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  721.746561][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  721.752878][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  721.758660][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  721.764518][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  721.770492][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  725.888631][    C0] net_ratelimit: 12 callbacks suppressed
[  725.888638][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  725.900320][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  725.906285][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  725.912134][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  725.917990][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  725.923838][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  725.929955][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  725.936091][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  726.768646][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  726.774582][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:09 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x0, 0x0, 0x0)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000001c0)={0x101, 0xb55, 0x6, 0x5}, 0x10)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0)

20:02:09 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(0xffffffffffffffff, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:09 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x406, r0)
ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000))
r2 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$kcm(0x29, 0x0, 0x0)
sendmsg$kcm(r3, &(0x7f0000000240)={0x0, 0x194, &(0x7f0000000040), 0x12c5, 0x0, 0x0, 0xe00}, 0x4000040)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x800, 0x0)
setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3)
r6 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc)
ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080))
ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000040))

20:02:09 executing program 3 (fault-call:2 fault-nth:37):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:02:09 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x400, 0x0)
sendmsg$nl_crypto(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81000520}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=@getstat={0xe0, 0x15, 0x10, 0x70bd2b, 0x25dfdbfd, {{'cbc(camellia)\x00'}, [], [], 0x400, 0x400}, ["", "", "", "", "", "", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x80}, 0x20000890)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000))
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240))
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

20:02:09 executing program 4:
openat$capi20(0xffffffffffffff9c, &(0x7f0000000480)='/dev/capi20\x00', 0x0, 0x0)
r0 = socket$packet(0x11, 0x400000000002, 0x300)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4)
r1 = socket$inet(0x2, 0x2000080001, 0x0)
setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c)
r2 = socket$inet6(0xa, 0x3, 0x84)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
r3 = socket$inet6_sctp(0xa, 0x1, 0x84)
r4 = socket$inet6_sctp(0xa, 0x1, 0x84)
r5 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r6=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r6}, &(0x7f00000002c0)=0x8)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r6, 0x2, 0x8001}, 0x8)
r7 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r8=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x8)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x5, 0x4, 0x10001, 0xffffffff, r8}, 0x10)
sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
r9 = socket$inet6_tcp(0xa, 0x1, 0x0)
r10 = fcntl$dupfd(r9, 0x0, r9)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$KVM_ASSIGN_SET_INTX_MASK(r11, 0x4040aea4, &(0x7f0000000000)={0x4, 0x5, 0xa, 0x4, 0x35})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b1}, &(0x7f0000000200), 0x0)

[  727.314092][T12580] FAULT_INJECTION: forcing a failure.
[  727.314092][T12580] name failslab, interval 1, probability 0, space 0, times 0
[  727.325338][T12582] Unknown ioctl 1074292226
[  727.326799][T12580] CPU: 1 PID: 12580 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  727.341069][T12580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  727.351138][T12580] Call Trace:
[  727.354621][T12580]  dump_stack+0x197/0x210
[  727.358978][T12580]  should_fail.cold+0xa/0x10
20:02:09 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0)
r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x12285, 0x0)
ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000040)={0x3d8, 0x100, 0x0, 0x8000, 0x4, 0x2})
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  727.363594][T12580]  ? is_bpf_text_address+0xac/0x160
[  727.368824][T12580]  ? setup_fault_attr+0x220/0x220
[  727.373894][T12580]  __should_failslab+0x121/0x190
[  727.378866][T12580]  should_failslab+0x9/0x14
[  727.378882][T12580]  kmem_cache_alloc+0x47/0x710
[  727.378898][T12580]  ? lock_acquire+0x190/0x410
[  727.378914][T12580]  ? net_tx_action+0xd30/0xd30
[  727.378936][T12580]  skb_clone+0x154/0x3d0
[  727.402142][T12580]  dev_queue_xmit_nit+0x3a1/0xaa0
[  727.407178][T12580]  dev_hard_start_xmit+0xbb/0x9b0
[  727.412193][T12580]  ? validate_xmit_skb_list+0xfc/0x150
[  727.417642][T12580]  sch_direct_xmit+0x372/0xd30
[  727.422417][T12580]  ? dev_watchdog+0xca0/0xca0
[  727.427138][T12580]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  727.432703][T12580]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  727.438695][T12580]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  727.444967][T12580]  ? sfb_dequeue+0x421/0x4d0
[  727.449662][T12580]  __qdisc_run+0x4bf/0x1770
[  727.454172][T12580]  __dev_queue_xmit+0x1650/0x35c0
[  727.459190][T12580]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  727.464466][T12580]  ? mark_held_locks+0xf0/0xf0
[  727.469231][T12580]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  727.475468][T12580]  ? debug_smp_processor_id+0x33/0x18a
[  727.480946][T12580]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  727.487116][T12580]  ? rcu_read_lock_held_common+0xbd/0x130
[  727.492842][T12580]  dev_queue_xmit+0x18/0x20
[  727.497333][T12580]  ? dev_queue_xmit+0x18/0x20
[  727.502007][T12580]  neigh_direct_output+0x16/0x20
[  727.507157][T12580]  ip6_finish_output2+0x109a/0x25c0
[  727.512484][T12580]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  727.518192][T12580]  ? lock_downgrade+0x920/0x920
[  727.523086][T12580]  ? netif_rx_ni+0x670/0x670
[  727.527709][T12580]  ? __kasan_check_read+0x11/0x20
[  727.532801][T12580]  __ip6_finish_output+0x444/0xaa0
[  727.537968][T12580]  ? __ip6_finish_output+0x444/0xaa0
[  727.543250][T12580]  ip6_finish_output+0x38/0x1f0
[  727.548094][T12580]  ip6_output+0x25e/0x880
[  727.552480][T12580]  ? ip6_finish_output+0x1f0/0x1f0
[  727.557685][T12580]  ? __ip6_finish_output+0xaa0/0xaa0
[  727.562973][T12580]  ? ip6_make_skb+0x370/0x570
[  727.567646][T12580]  ? ip_reply_glue_bits+0xc0/0xc0
[  727.572672][T12580]  ip6_local_out+0xbb/0x1b0
[  727.577169][T12580]  ip6_send_skb+0xbb/0x350
[  727.581632][T12580]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  727.587092][T12580]  ? ip6_forward_finish+0x570/0x570
[  727.592282][T12580]  udpv6_sendmsg+0x22f3/0x2b30
[  727.597155][T12580]  ? __kasan_check_write+0x14/0x20
[  727.602258][T12580]  ? ip_reply_glue_bits+0xc0/0xc0
[  727.607282][T12580]  ? udp_v6_get_port+0x6b0/0x6b0
[  727.612259][T12580]  ? __kasan_check_read+0x11/0x20
[  727.617289][T12580]  ? mark_lock+0xc2/0x1220
[  727.621726][T12580]  ? __kasan_check_read+0x11/0x20
[  727.626750][T12580]  ? mark_lock+0xc2/0x1220
[  727.631164][T12580]  ? __kasan_check_read+0x11/0x20
[  727.636196][T12580]  ? ___might_sleep+0x163/0x2c0
[  727.641341][T12580]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  727.647001][T12580]  ? aa_sk_perm+0x346/0xb00
[  727.651534][T12580]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  727.657096][T12580]  inet6_sendmsg+0x9e/0xe0
[  727.661538][T12580]  ? inet6_sendmsg+0x9e/0xe0
[  727.666137][T12580]  ? inet6_ioctl+0x1c0/0x1c0
[  727.670721][T12580]  sock_sendmsg+0xd7/0x130
[  727.675132][T12580]  ____sys_sendmsg+0x358/0x880
[  727.679885][T12580]  ? kernel_sendmsg+0x50/0x50
[  727.684547][T12580]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  727.690078][T12580]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  727.696049][T12580]  ? find_held_lock+0x35/0x130
[  727.700805][T12580]  ___sys_sendmsg+0x100/0x170
[  727.705477][T12580]  ? sendmsg_copy_msghdr+0x70/0x70
[  727.710576][T12580]  ? __kasan_check_read+0x11/0x20
[  727.715612][T12580]  ? __might_fault+0x12b/0x1e0
[  727.720384][T12580]  ? find_held_lock+0x35/0x130
[  727.725133][T12580]  ? __might_fault+0x12b/0x1e0
[  727.729881][T12580]  ? do_dup2+0x4f0/0x4f0
[  727.734112][T12580]  ? lock_downgrade+0x920/0x920
[  727.738971][T12580]  ? ___might_sleep+0x163/0x2c0
[  727.743826][T12580]  __sys_sendmmsg+0x1bf/0x4d0
[  727.748501][T12580]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  727.753560][T12580]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  727.759882][T12580]  ? fput_many+0x12c/0x1a0
[  727.764306][T12580]  ? fput+0x1b/0x20
[  727.768105][T12580]  ? ksys_write+0x1cf/0x290
[  727.772686][T12580]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  727.778132][T12580]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  727.783666][T12580]  ? do_syscall_64+0x26/0x790
[  727.788434][T12580]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  727.794494][T12580]  ? do_syscall_64+0x26/0x790
[  727.799336][T12580]  __x64_sys_sendmmsg+0x9d/0x100
[  727.804288][T12580]  do_syscall_64+0xfa/0x790
[  727.808810][T12580]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  727.814698][T12580] RIP: 0033:0x45a919
[  727.818600][T12580] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  727.838404][T12580] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  727.846826][T12580] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  727.854787][T12580] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  727.862761][T12580] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  727.870842][T12580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  727.878999][T12580] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:02:10 executing program 3 (fault-call:2 fault-nth:38):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:02:10 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$smack_xattr_label(0xffffffffffffffff, &(0x7f00000001c0)='seurity.UMACK64I1IN\x00\x00', 0x0, 0x0, 0x2)
r0 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x5, &(0x7f0000000040), 0x10)
accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240))
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x10)
ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0)
setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x20, 0x4)
r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x320, 0x0, [], [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x801, 0x0, 0x0, 0x1}]})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0xa01, 0x0)
r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
sendfile(r2, r3, &(0x7f00000000c0)=0x7, 0x4)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r7)
write$P9_RGETATTR(r4, &(0x7f0000000400)={0xa0, 0x19, 0x1, {0x5, {0x1, 0x1, 0x3}, 0x8, r5, r7, 0x1, 0x6, 0x8, 0x59c, 0xbef2, 0xffff, 0x1, 0x7, 0x2, 0x4, 0x4, 0x2, 0x7, 0x400, 0x80000000}}, 0xa0)

20:02:10 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0)
r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x12285, 0x0)
ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000040)={0x3d8, 0x100, 0x0, 0x8000, 0x4, 0x2})
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  728.072311][T12596] FAULT_INJECTION: forcing a failure.
[  728.072311][T12596] name failslab, interval 1, probability 0, space 0, times 0
[  728.144747][T12596] CPU: 0 PID: 12596 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  728.154813][T12596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  728.165405][T12596] Call Trace:
[  728.168720][T12596]  dump_stack+0x197/0x210
[  728.173080][T12596]  should_fail.cold+0xa/0x10
[  728.177703][T12596]  ? setup_fault_attr+0x220/0x220
[  728.182753][T12596]  ? ___might_sleep+0x163/0x2c0
[  728.187979][T12596]  __should_failslab+0x121/0x190
[  728.192952][T12596]  should_failslab+0x9/0x14
[  728.197476][T12596]  kmem_cache_alloc_node+0x268/0x740
[  728.202785][T12596]  ? __dev_queue_xmit+0x173f/0x35c0
[  728.208002][T12596]  ? trace_hardirqs_on+0x67/0x240
[  728.213057][T12596]  ? __dev_queue_xmit+0x173f/0x35c0
[  728.218293][T12596]  __alloc_skb+0xd5/0x5e0
[  728.222638][T12596]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  728.228201][T12596]  alloc_skb_with_frags+0x93/0x590
[  728.233340][T12596]  ? find_held_lock+0x35/0x130
[  728.238119][T12596]  sock_alloc_send_pskb+0x7ad/0x920
[  728.243371][T12596]  ? sock_wmalloc+0x120/0x120
[  728.248072][T12596]  ? __local_bh_enable_ip+0x15a/0x270
[  728.253547][T12596]  ? ip6_finish_output2+0x1106/0x25c0
[  728.259009][T12596]  ? ip6_mtu+0x2e6/0x450
[  728.263259][T12596]  ? find_held_lock+0x35/0x130
[  728.268730][T12596]  sock_alloc_send_skb+0x32/0x40
[  728.273674][T12596]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  728.279433][T12596]  ? ip_reply_glue_bits+0xc0/0xc0
[  728.284572][T12596]  ? ip6_setup_cork+0x1920/0x1920
[  728.289694][T12596]  ? ip6_flush_pending_frames+0xd0/0xd0
[  728.295351][T12596]  ? __kasan_check_read+0x11/0x20
[  728.300429][T12596]  ip6_make_skb+0x32f/0x570
[  728.304963][T12596]  ? ip_reply_glue_bits+0xc0/0xc0
[  728.309999][T12596]  ? ip_reply_glue_bits+0xc0/0xc0
[  728.315726][T12596]  ? ip6_push_pending_frames+0xf0/0xf0
[  728.321384][T12596]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  728.327400][T12596]  ? ip6_forward_finish+0x570/0x570
[  728.332604][T12596]  ? rcu_read_lock_held+0x9c/0xb0
[  728.337669][T12596]  udpv6_sendmsg+0x22a1/0x2b30
[  728.342458][T12596]  ? ip_reply_glue_bits+0xc0/0xc0
[  728.347505][T12596]  ? udp_v6_get_port+0x6b0/0x6b0
[  728.352448][T12596]  ? finish_task_switch+0x147/0x750
[  728.357656][T12596]  ? _raw_spin_unlock_irq+0x23/0x80
[  728.362861][T12596]  ? lockdep_hardirqs_on+0x421/0x5e0
[  728.368158][T12596]  ? __kasan_check_read+0x11/0x20
[  728.373215][T12596]  ? mark_lock+0xc2/0x1220
[  728.377646][T12596]  ? ___might_sleep+0x163/0x2c0
[  728.382511][T12596]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  728.388145][T12596]  ? aa_sk_perm+0x346/0xb00
[  728.392673][T12596]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  728.398233][T12596]  inet6_sendmsg+0x9e/0xe0
[  728.402655][T12596]  ? inet6_sendmsg+0x9e/0xe0
[  728.407250][T12596]  ? inet6_ioctl+0x1c0/0x1c0
[  728.411841][T12596]  sock_sendmsg+0xd7/0x130
[  728.416266][T12596]  ____sys_sendmsg+0x358/0x880
[  728.421064][T12596]  ? kernel_sendmsg+0x50/0x50
[  728.425886][T12596]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  728.431519][T12596]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  728.437518][T12596]  ? find_held_lock+0x35/0x130
[  728.442305][T12596]  ___sys_sendmsg+0x100/0x170
[  728.447097][T12596]  ? sendmsg_copy_msghdr+0x70/0x70
[  728.452308][T12596]  ? __kasan_check_read+0x11/0x20
[  728.457343][T12596]  ? __might_fault+0x12b/0x1e0
[  728.462117][T12596]  ? find_held_lock+0x35/0x130
[  728.466885][T12596]  ? __might_fault+0x12b/0x1e0
[  728.471653][T12596]  ? do_dup2+0x4f0/0x4f0
[  728.475900][T12596]  ? lock_downgrade+0x920/0x920
[  728.480767][T12596]  ? ___might_sleep+0x163/0x2c0
[  728.485622][T12596]  __sys_sendmmsg+0x1bf/0x4d0
[  728.490314][T12596]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  728.495395][T12596]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  728.501669][T12596]  ? fput_many+0x12c/0x1a0
[  728.506105][T12596]  ? fput+0x1b/0x20
[  728.509938][T12596]  ? ksys_write+0x1cf/0x290
[  728.514457][T12596]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  728.519923][T12596]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  728.525388][T12596]  ? do_syscall_64+0x26/0x790
[  728.530436][T12596]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  728.536519][T12596]  ? do_syscall_64+0x26/0x790
[  728.541214][T12596]  __x64_sys_sendmmsg+0x9d/0x100
[  728.546162][T12596]  do_syscall_64+0xfa/0x790
[  728.550778][T12596]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  728.556673][T12596] RIP: 0033:0x45a919
[  728.560583][T12596] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  728.580374][T12596] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  728.588890][T12596] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  728.596884][T12596] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  728.604874][T12596] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  728.612865][T12596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  728.620941][T12596] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:02:10 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x2})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000006500010700"/20, @ANYRES32, @ANYBLOB="00000000000000000000000008000b00c9000000"], 0x2c}}, 0x0)
flock(r0, 0x1)
r2 = socket(0x1000000010, 0x80003, 0x0)
sendmmsg$alg(r2, &(0x7f0000000100), 0x4924924924926ed, 0x0)

20:02:10 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0)
r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x12285, 0x0)
ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000040)={0x3d8, 0x100, 0x0, 0x8000, 0x4, 0x2})
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  730.928665][    C0] net_ratelimit: 18 callbacks suppressed
[  730.928673][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  730.940188][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  732.128689][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  732.128776][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  732.128882][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  732.145964][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  732.151755][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  732.157490][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  732.163522][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  732.169282][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  736.288672][    C0] net_ratelimit: 12 callbacks suppressed
[  736.288678][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  736.300261][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  736.306092][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  736.311977][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  736.317821][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  736.323595][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  736.329421][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  736.335159][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  737.168635][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  737.174491][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:20 executing program 4:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000380)={<r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x0)
write$binfmt_script(r2, &(0x7f0000000740)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000001a00)=ANY=[@ANYBLOB="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"]], @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0x29d)
openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0)
ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xffff, 0x5, 0x8000, 0x6}})
fallocate(r2, 0x8, 0x0, 0x7ffe)

20:02:20 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$smack_xattr_label(0xffffffffffffffff, &(0x7f00000001c0)='seurity.UMACK64I1IN\x00\x00', 0x0, 0x0, 0x2)
r0 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x5, &(0x7f0000000040), 0x10)
accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240))
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x10)
ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0)
setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x20, 0x4)
r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x320, 0x0, [], [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x801, 0x0, 0x0, 0x1}]})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0xa01, 0x0)
r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
sendfile(r2, r3, &(0x7f00000000c0)=0x7, 0x4)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r7=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r7)
write$P9_RGETATTR(r4, &(0x7f0000000400)={0xa0, 0x19, 0x1, {0x5, {0x1, 0x1, 0x3}, 0x8, r5, r7, 0x1, 0x6, 0x8, 0x59c, 0xbef2, 0xffff, 0x1, 0x7, 0x2, 0x4, 0x4, 0x2, 0x7, 0x400, 0x80000000}}, 0xa0)

20:02:20 executing program 3 (fault-call:2 fault-nth:39):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:02:20 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0)
r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x12285, 0x0)
ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000040)={0x3d8, 0x100, 0x0, 0x8000, 0x4, 0x2})
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:20 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(0xffffffffffffffff, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:20 executing program 5:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100))
r1 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r1, 0x4, 0xffffffffffffffff, 0x8)
r2 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r2, 0x4, 0xffffffffffffffff, 0x8)
r3 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r3, 0x4, 0xffffffffffffffff, 0x8)
r4 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r4, 0x4, 0xffffffffffffffff, 0x8)
r5 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r5, 0x4, 0xffffffffffffffff, 0x8)
clone3(&(0x7f00000003c0)={0x20000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)=<r6=>0x0, {0x38}, &(0x7f00000002c0)=""/9, 0x9, &(0x7f0000000300)=""/106, &(0x7f0000000380)=[r1, r2, 0x0, r3, 0x0, r4, 0x0, r5], 0x8}, 0x50)
ioprio_set$pid(0x4, r6, 0x100)
clone(0x801480ff, 0x0, 0x0, 0x0, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r7 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
io_setup(0x5, &(0x7f0000000000)=<r8=>0x0)
io_destroy(r8)
r9 = openat$cgroup_procs(r7, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r9, &(0x7f0000000140), 0x12)

[  738.759158][T12629] FAULT_INJECTION: forcing a failure.
[  738.759158][T12629] name failslab, interval 1, probability 0, space 0, times 0
[  738.809931][T12629] CPU: 0 PID: 12629 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  738.819963][T12629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  738.830033][T12629] Call Trace:
[  738.833338][T12629]  dump_stack+0x197/0x210
[  738.837683][T12629]  should_fail.cold+0xa/0x10
[  738.842290][T12629]  ? setup_fault_attr+0x220/0x220
[  738.847323][T12629]  ? ___might_sleep+0x163/0x2c0
[  738.852184][T12629]  __should_failslab+0x121/0x190
[  738.857139][T12629]  should_failslab+0x9/0x14
[  738.861681][T12629]  kmem_cache_alloc_node_trace+0x274/0x750
[  738.867512][T12629]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  738.873500][T12629]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  738.879317][T12629]  __kmalloc_node_track_caller+0x3d/0x70
[  738.884963][T12629]  __kmalloc_reserve.isra.0+0x40/0xf0
[  738.890367][T12629]  __alloc_skb+0x10b/0x5e0
[  738.894796][T12629]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  738.900368][T12629]  alloc_skb_with_frags+0x93/0x590
[  738.905483][T12629]  ? find_held_lock+0x35/0x130
[  738.910260][T12629]  sock_alloc_send_pskb+0x7ad/0x920
[  738.915475][T12629]  ? sock_wmalloc+0x120/0x120
[  738.920155][T12629]  ? __local_bh_enable_ip+0x15a/0x270
[  738.925530][T12629]  ? ip6_finish_output2+0x1106/0x25c0
[  738.930908][T12629]  ? ip6_mtu+0x2e6/0x450
[  738.935236][T12629]  ? find_held_lock+0x35/0x130
[  738.940009][T12629]  sock_alloc_send_skb+0x32/0x40
[  738.944951][T12629]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  738.950680][T12629]  ? ip_reply_glue_bits+0xc0/0xc0
[  738.955716][T12629]  ? ip6_setup_cork+0x1920/0x1920
[  738.960747][T12629]  ? ip6_flush_pending_frames+0xd0/0xd0
[  738.966289][T12629]  ? __kasan_check_read+0x11/0x20
[  738.971320][T12629]  ip6_make_skb+0x32f/0x570
[  738.975823][T12629]  ? ip_reply_glue_bits+0xc0/0xc0
[  738.980859][T12629]  ? ip_reply_glue_bits+0xc0/0xc0
[  738.985884][T12629]  ? ip6_push_pending_frames+0xf0/0xf0
[  738.991353][T12629]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  738.996900][T12629]  ? ip6_forward_finish+0x570/0x570
[  739.002102][T12629]  ? rcu_read_lock_held+0x9c/0xb0
[  739.007136][T12629]  udpv6_sendmsg+0x22a1/0x2b30
[  739.011924][T12629]  ? __kasan_check_write+0x14/0x20
[  739.017037][T12629]  ? ip_reply_glue_bits+0xc0/0xc0
[  739.022073][T12629]  ? udp_v6_get_port+0x6b0/0x6b0
[  739.027012][T12629]  ? __kasan_check_read+0x11/0x20
[  739.032038][T12629]  ? mark_lock+0xc2/0x1220
[  739.036466][T12629]  ? __kasan_check_read+0x11/0x20
[  739.041648][T12629]  ? mark_lock+0xc2/0x1220
[  739.046175][T12629]  ? __kasan_check_read+0x11/0x20
[  739.051240][T12629]  ? ___might_sleep+0x163/0x2c0
[  739.056125][T12629]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  739.061787][T12629]  ? aa_sk_perm+0x346/0xb00
[  739.066319][T12629]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  739.071876][T12629]  inet6_sendmsg+0x9e/0xe0
[  739.076294][T12629]  ? inet6_sendmsg+0x9e/0xe0
[  739.080890][T12629]  ? inet6_ioctl+0x1c0/0x1c0
[  739.085501][T12629]  sock_sendmsg+0xd7/0x130
[  739.089920][T12629]  ____sys_sendmsg+0x358/0x880
[  739.094686][T12629]  ? kernel_sendmsg+0x50/0x50
[  739.099372][T12629]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  739.104942][T12629]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  739.110920][T12629]  ? find_held_lock+0x35/0x130
[  739.115707][T12629]  ___sys_sendmsg+0x100/0x170
[  739.120397][T12629]  ? sendmsg_copy_msghdr+0x70/0x70
[  739.125518][T12629]  ? __kasan_check_read+0x11/0x20
[  739.130756][T12629]  ? __might_fault+0x12b/0x1e0
[  739.135623][T12629]  ? find_held_lock+0x35/0x130
[  739.140445][T12629]  ? __might_fault+0x12b/0x1e0
[  739.145222][T12629]  ? do_dup2+0x4f0/0x4f0
[  739.149482][T12629]  ? lock_downgrade+0x920/0x920
[  739.154359][T12629]  ? ___might_sleep+0x163/0x2c0
[  739.159322][T12629]  __sys_sendmmsg+0x1bf/0x4d0
[  739.164024][T12629]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  739.169269][T12629]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  739.175814][T12629]  ? fput_many+0x12c/0x1a0
[  739.180261][T12629]  ? fput+0x1b/0x20
[  739.184209][T12629]  ? ksys_write+0x1cf/0x290
[  739.188743][T12629]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  739.194597][T12629]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  739.200180][T12629]  ? do_syscall_64+0x26/0x790
[  739.204893][T12629]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  739.210981][T12629]  ? do_syscall_64+0x26/0x790
[  739.215698][T12629]  __x64_sys_sendmmsg+0x9d/0x100
[  739.220671][T12629]  do_syscall_64+0xfa/0x790
[  739.225187][T12629]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  739.231098][T12629] RIP: 0033:0x45a919
[  739.235020][T12629] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  739.254947][T12629] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  739.263845][T12629] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  739.271835][T12629] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  739.279831][T12629] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  739.288510][T12629] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  739.296589][T12629] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:02:21 executing program 0:
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8)
r3 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, <r4=>0x0})
r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x208100, 0x0)
r6 = gettid()
pipe(&(0x7f00000001c0)={<r7=>0xffffffffffffffff})
pipe(&(0x7f0000000680)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
r9 = getpid()
sched_setscheduler(r9, 0x5, &(0x7f0000000380))
r10 = dup(0xffffffffffffffff)
setsockopt$packet_int(r10, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d)
r11 = getpgrp(0x0)
capget(&(0x7f0000000000)={0x0, r11}, 0x0)
r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040))
r13 = timerfd_create(0x7, 0x0)
timerfd_settime(r10, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0)
timerfd_settime(r13, 0x0, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
fcntl$getownex(r13, 0x10, &(0x7f0000000280)={0x0, <r14=>0x0})
r15 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
fsetxattr$system_posix_acl(r15, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000c40)=ANY=[], 0x0, 0x1)
r16 = socket(0xa, 0x3, 0x8)
r17 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000)
ioctl$sock_inet_SIOCSIFFLAGS(r16, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4})
write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x40000000, &(0x7f0000000040)={<r18=>0xffffffffffffffff}, 0x0, 0x5}}, 0x2cb)
r19 = gettid()
waitid(0x83b895581628fca4, r14, &(0x7f0000000040), 0x4, &(0x7f0000000b00))
sendmsg$key(r16, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r18, @ANYRESDEC=r19]], 0xfffffffffffffe56}}, 0x20004850)
r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27)
r22 = dup2(r21, r20)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r22, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
r23 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r23)
r24 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r26 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
writev(r26, &(0x7f0000000900)=[{&(0x7f0000000d40)="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"}, {&(0x7f0000000a00)="aa569e3bf2b03b68c3ea8388d4a91a6df2ec7ccd24b3313c69ff4474d35dcf480dc912d299228515bb8662e320bba0d1feb227eedb9c87b8d6f224b31954dd7b517e15b89ea5ff7567d4be259722328a2b0e1c231983420697279917fbbccaff79962876e840e7df6ec74dce5daec6ef55b585bf2d8c7fb9086e6f67068f349d5f0900f62c02e7f2f304cc581f715d6e32b5149278b777403df8fe1b8615c0d60cba1e594ddc06f9e41f8df6738c9494f59bce2300feb292c0ade25c7522217e12da91c9a4c5d93e9b7677ddb799b866086c3a327e6d8014000fbea11e4119fc9035c8", 0x112}, {&(0x7f0000000bc0)="818e4f40430bae5993b169ea30a4299c3c6ac96331243791d88cde71688d6dac799e066741f083f368487ff564cf95b9cbefd4a233f8d4bc796d1e224c167f40d2ac4f5722c39bffd3270d365d9bb4e9c6385c97fe0538bec1bdb448a899c3"}, {&(0x7f00000005c0)="b5f8b3f49c71600edf19", 0x9f}], 0x10000000000001ca)
ioctl$SG_GET_REQUEST_TABLE(r24, 0x227d, &(0x7f0000000780))
kcmp(r23, r19, 0x0, 0xffffffffffffffff, r24)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, <r27=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x4, 0x4, 0x0, 0x10002}, &(0x7f00000009c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x79c9e9235c799199)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r19, r22, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={<r28=>r14, r15, 0x0, 0x1, &(0x7f0000000080)='\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r12, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r11, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r28, r10, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r8, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r27}, 0xc)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r6, r7, 0x0, 0x9, &(0x7f0000000200)='/dev/kvm\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, r5, 0x0, 0x82, &(0x7f00000000c0)='m\x06\x00j\x00y.\x02ven\x01\x04\x00\xf1\xbb\xfc4\xd4-,\x91\xa1\xecz\x9f%\xc3\xe9\xd8\xf0h0\xd3\xa8\xaaYig\xc8\xba\x85\x8f\xb8\xb5x\xd0|&\x01\xdf\xef=\xb8Q\x1c\xfeD#\xa1k\t\x86\xc2\x89)\xd8N\xf5\x8b8\xb3\xb6kzk\xd4W\x8a.\xc9ssH\xa0g\x87\xc5h_\xa1\xa1W\xbc\x93\xf9V\xa7\x8a\xc2\xb1\xe6\x8c\x82I_\x04\x1e\x84\xc1\x9d\x8eWl%X\x9d\x10\xed\xd9fpjU\xc6\x88\x85\xc8\xf6\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='v#\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={<r29=>0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r27}, 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r29, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10)
connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

20:02:21 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0)
openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x12285, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:21 executing program 3 (fault-call:2 fault-nth:40):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:02:21 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x80000, 0x0)
ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f00000016c0))
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0x484)
recvmsg$can_j1939(r3, &(0x7f0000000280)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @local}}, 0xfffffffffffffcfb, &(0x7f0000000040)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/78, 0x4e}, {&(0x7f00000003c0)=""/97, 0x61}], 0x3, &(0x7f0000001640)=""/102, 0x66}, 0x40000142)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000240)={0x81, 0x8, 0x7, 0x81, 0x9, 0x5, 0x6, 0x80, 0xa0, 0x8, 0xf9, 0x3, 0x4, 0x5}, 0xe)
sendmsg$sock(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="130d39dc47876c4e39cc2fd19c85cf7223e1ec8b464bb3205f12abf4b955502b4f0d52df9cd77f98670782ffbfa160ec8b8984ed5f4ebcf6f8b0660fd11842ecad64df531bb905e0953f67c27e95c0ff5e3b2664799601940d4db2e4d7429e9e7d543efe0d52ceeab08c1af4e2003f469ed0d89083bf0c5da9ac1372100a2bf5bd71f3e9a71c2e86ae33d0baee911a4db66ea518bc1946890241bade8fa20e64", 0xa0}], 0x1}, 0x0)
recvmmsg(r1, &(0x7f0000001b40), 0x0, 0x0, 0x0)

[  739.621874][T12648] FAULT_INJECTION: forcing a failure.
[  739.621874][T12648] name failslab, interval 1, probability 0, space 0, times 0
20:02:21 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  739.725313][T12648] CPU: 1 PID: 12648 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  739.735370][T12648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  739.745472][T12648] Call Trace:
[  739.745497][T12648]  dump_stack+0x197/0x210
[  739.745518][T12648]  should_fail.cold+0xa/0x10
[  739.745536][T12648]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  739.745552][T12648]  ? setup_fault_attr+0x220/0x220
[  739.745574][T12648]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  739.773799][T12648]  __should_failslab+0x121/0x190
[  739.778766][T12648]  should_failslab+0x9/0x14
[  739.783315][T12648]  kmem_cache_alloc+0x47/0x710
[  739.788115][T12648]  ? __kasan_check_read+0x11/0x20
[  739.793172][T12648]  skb_clone+0x154/0x3d0
[  739.797446][T12648]  ip6_finish_output2+0x18be/0x25c0
[  739.802754][T12648]  ? ip6_mtu+0x2e6/0x450
[  739.807552][T12648]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  739.813149][T12648]  ? lock_downgrade+0x920/0x920
[  739.818209][T12648]  ? rcu_read_lock_held+0x9c/0xb0
20:02:21 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x480000, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  739.823272][T12648]  ? __kasan_check_read+0x11/0x20
[  739.828347][T12648]  __ip6_finish_output+0x444/0xaa0
[  739.833652][T12648]  ? __ip6_finish_output+0x444/0xaa0
[  739.838974][T12648]  ip6_finish_output+0x38/0x1f0
[  739.844165][T12648]  ip6_output+0x25e/0x880
[  739.848535][T12648]  ? ip6_finish_output+0x1f0/0x1f0
[  739.848565][T12648]  ? __ip6_finish_output+0xaa0/0xaa0
[  739.858974][T12648]  ? ip6_make_skb+0x370/0x570
[  739.858991][T12648]  ? ip_reply_glue_bits+0xc0/0xc0
[  739.859011][T12648]  ip6_local_out+0xbb/0x1b0
[  739.859028][T12648]  ip6_send_skb+0xbb/0x350
[  739.859052][T12648]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  739.883411][T12648]  ? ip6_forward_finish+0x570/0x570
[  739.888694][T12648]  udpv6_sendmsg+0x22f3/0x2b30
[  739.893511][T12648]  ? __kasan_check_write+0x14/0x20
[  739.898823][T12648]  ? ip_reply_glue_bits+0xc0/0xc0
[  739.903881][T12648]  ? udp_v6_get_port+0x6b0/0x6b0
[  739.908936][T12648]  ? __kasan_check_read+0x11/0x20
[  739.913987][T12648]  ? mark_lock+0xc2/0x1220
[  739.918539][T12648]  ? __kasan_check_read+0x11/0x20
20:02:22 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  739.923612][T12648]  ? mark_lock+0xc2/0x1220
[  739.928150][T12648]  ? __kasan_check_read+0x11/0x20
[  739.933209][T12648]  ? ___might_sleep+0x163/0x2c0
[  739.938361][T12648]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  739.944016][T12648]  ? aa_sk_perm+0x346/0xb00
[  739.948552][T12648]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  739.954134][T12648]  inet6_sendmsg+0x9e/0xe0
[  739.958585][T12648]  ? inet6_sendmsg+0x9e/0xe0
[  739.963204][T12648]  ? inet6_ioctl+0x1c0/0x1c0
[  739.967809][T12648]  sock_sendmsg+0xd7/0x130
[  739.972224][T12648]  ____sys_sendmsg+0x358/0x880
[  739.972241][T12648]  ? kernel_sendmsg+0x50/0x50
[  739.972258][T12648]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  739.972272][T12648]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  739.972285][T12648]  ? find_held_lock+0x35/0x130
[  739.972308][T12648]  ___sys_sendmsg+0x100/0x170
[  740.002809][T12648]  ? sendmsg_copy_msghdr+0x70/0x70
[  740.007948][T12648]  ? __kasan_check_read+0x11/0x20
[  740.013001][T12648]  ? __might_fault+0x12b/0x1e0
[  740.021208][T12648]  ? find_held_lock+0x35/0x130
[  740.026001][T12648]  ? __might_fault+0x12b/0x1e0
[  740.030807][T12648]  ? do_dup2+0x4f0/0x4f0
[  740.035251][T12648]  ? lock_downgrade+0x920/0x920
[  740.040139][T12648]  ? ___might_sleep+0x163/0x2c0
[  740.045024][T12648]  __sys_sendmmsg+0x1bf/0x4d0
[  740.049737][T12648]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  740.054806][T12648]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  740.061082][T12648]  ? fput_many+0x12c/0x1a0
[  740.065522][T12648]  ? fput+0x1b/0x20
[  740.069433][T12648]  ? ksys_write+0x1cf/0x290
20:02:22 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  740.073949][T12648]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  740.079425][T12648]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  740.085009][T12648]  ? do_syscall_64+0x26/0x790
[  740.089699][T12648]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  740.095786][T12648]  ? do_syscall_64+0x26/0x790
[  740.100486][T12648]  __x64_sys_sendmmsg+0x9d/0x100
[  740.105442][T12648]  do_syscall_64+0xfa/0x790
[  740.110770][T12648]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  740.116844][T12648] RIP: 0033:0x45a919
[  740.120762][T12648] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  740.141201][T12648] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  740.141217][T12648] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  740.141225][T12648] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  740.141233][T12648] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
20:02:22 executing program 4:
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
userfaultfd(0x0)
pipe2(&(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x4800)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000000))
write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x76660e)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
clone(0x3d1a7189a5548d4b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

20:02:22 executing program 4:
openat$udambuf(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/udmabuf\x00', 0x2)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipx={0x4, 0x8, 0x9, "c517cfd32959", 0x80}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)="8f2bb314a644609bf110c566caf48bf1911133a95d9d017da4b33fda3ae542a1ac1876be2481203588befbdd16a413b9f4789a050aed51c6d873d6784a96f764cca0a73eacd654c587e4ca3304cc8b12805533eb918b922be02707e5b248694b88a52bd7181f8c0ad02139e583ef69df90472ff168e52868fa45c26a64b167835f984a75c15eacb2e1eaebd36361fdb39cbe9b0fdeb3d47ab8651f588d66ec4ad3c9d7e7c2", 0xa5}, {&(0x7f00000002c0)="074a811f4ba38bfa3c05a9baf1419f52e119c232f66e94011d94789a38bf1d8e792bf594338d980c782a2ee04e61367125979a201479e94b3f4d7998bde51ed2c9c14b853e32f48bf26d25b58c42941e94cd73991ebcaecb56a08bdfdc1d502d7587da84672dd77b550fd52c20b9025f156658b03104e1d240ce99c21c6e50dac793d77f7cb00214d0635036a88eba9dc3ab83", 0x93}, {&(0x7f0000000380)="2f9bd75c2579a01bb07df83d7afbff6c7a2d7420753354e008e1a1e4ea71e17dc3a573f9807ed71894b789f4f50f770202bdb56c87043c698066e4b3371c44d91445b84bff0c781e5541a4cea3a75b1991d570c932873e45f7f89f835b089ea8a561959dac4e84943401349903f0c46c544b00965e3d4c58536e31c999d74bd64568ed40db7dea0c5c2a9f46190594bc8d9e72e9a95c0d6803eb0fa9c5c2f3c5ea0563e5d3b564ff7209e0e1fb7adfd3e8c99bc0ad678ca615a22e", 0x3e7}, {&(0x7f0000000200)="7a729092719ef9090e365be80646c07ecf1e8d58cb327b526d9d6bc176e981ef7c9cb32022350e0c0fa3cf722596c13171f0578392f0593c4965e0b9ca553c80e7", 0x41}, {&(0x7f0000000440)="f8431ff01a4982a18ec8b834ecd080466aaa867f7db38be2529344e673ee12095927341b77b57ff9f2664ab4666c6f54b7a6a3dd1bd896386ac8cf2ff5b9a4afd62c2aab865d9fefa31264e6aa1dd109be535009f9cae42eb47b46ed3e537d5d761807de5d930b7fdd69b65fd529bb26b6c8883ed917bf14283b7eb6382eb8dcf02b6e775dd863245d9ba9291f7ac8ad4d15a9d6c2ac76c1db06ca789edf314efc1f9c8a47f93c664c0c5d62818fd4c9b938608b1a8458006fcc2ccf43b6bbaa1d0173a304b23a1decb02fa4e4066dcc981b59ea4a", 0xd5}], 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x300}, 0x40000)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = memfd_create(&(0x7f0000000940)='\x00', 0x1)
fchmod(r2, 0x80)
ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000900)={0x7, 'bridge_slave_1\x00', {0x4cb}, 0x7})
sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x48, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b000508d25a80648c6356c10924fc001a0004000a0f0000053582c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0)

[  740.141241][T12648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  740.141250][T12648] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  740.364237][T12671] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'.
[  741.328693][    C0] net_ratelimit: 18 callbacks suppressed
[  741.328702][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  741.340700][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:23 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  742.528730][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  742.534795][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  742.540775][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  742.546680][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  742.552620][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  742.558398][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  742.564813][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  742.570884][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  746.688661][    C0] net_ratelimit: 12 callbacks suppressed
[  746.688668][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  746.700442][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  746.706367][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  746.712427][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  746.718279][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  746.724171][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  746.730200][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  746.736032][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  747.568637][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  747.574498][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:30 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1, 0x100010, r0, 0x87b8e000)
write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0)
write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8)
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0)
dup2(r1, r2)
r3 = socket$inet(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f00000002c0)=0x1, 0x1a5)
setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000180)="8907040400", 0x5)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10)
setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0xfea3)
recvmmsg(r3, &(0x7f0000000dc0)=[{{&(0x7f0000000300)=@x25={0x9, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000400)=""/97, 0x61}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000500)=""/110, 0x6e}], 0x3, &(0x7f0000000580)=""/77, 0x4d}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, <r4=>0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000680)=""/233, 0xe9}, {&(0x7f00000007c0)=""/86, 0x56}, {&(0x7f0000000380)=""/43, 0x2b}, {&(0x7f0000000840)=""/217, 0xd9}], 0x4, &(0x7f0000000980)=""/34, 0x22}, 0x89}, {{&(0x7f00000009c0)=@rc, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/171, 0xab}], 0x1}, 0x6}, {{&(0x7f0000000b80)=@nl=@proc, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c00)=""/71, 0x47}], 0x1, &(0x7f0000000cc0)=""/220, 0xdc}, 0x717}], 0x4, 0x100, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000ec0)={'security\x00', 0x86, "b4bd6318603506368d0c5a57909eb2778a803c80bad7d52c28e26dd2053dba5241104ae3ec68867f6d14f468a56bdd918bc07910526c1cfbc929272931b7436f3521e2763eb28c9e91aac58a2e0795163b5330f7cb7eea2dd1fcfe71ef3d6a7ec525675da8294b92a1eb8cdd7ff4abcfe64d7de774d15f89edcb1109661949e383a763b08a85"}, &(0x7f0000000f80)=0xaa)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00')
r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0xc40, 0x0)
ioctl$VHOST_SET_LOG_BASE(r5, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0))
ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0)
msgget$private(0x0, 0x10)

20:02:30 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:30 executing program 3 (fault-call:2 fault-nth:41):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:02:30 executing program 0:
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8)
r3 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, <r4=>0x0})
r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x208100, 0x0)
r6 = gettid()
pipe(&(0x7f00000001c0)={<r7=>0xffffffffffffffff})
pipe(&(0x7f0000000680)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
r9 = getpid()
sched_setscheduler(r9, 0x5, &(0x7f0000000380))
r10 = dup(0xffffffffffffffff)
setsockopt$packet_int(r10, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d)
r11 = getpgrp(0x0)
capget(&(0x7f0000000000)={0x0, r11}, 0x0)
r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040))
r13 = timerfd_create(0x7, 0x0)
timerfd_settime(r10, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0)
timerfd_settime(r13, 0x0, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
fcntl$getownex(r13, 0x10, &(0x7f0000000280)={0x0, <r14=>0x0})
r15 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
fsetxattr$system_posix_acl(r15, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000c40)=ANY=[], 0x0, 0x1)
r16 = socket(0xa, 0x3, 0x8)
r17 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000)
ioctl$sock_inet_SIOCSIFFLAGS(r16, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4})
write$RDMA_USER_CM_CMD_CREATE_ID(r17, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x40000000, &(0x7f0000000040)={<r18=>0xffffffffffffffff}, 0x0, 0x5}}, 0x2cb)
r19 = gettid()
waitid(0x83b895581628fca4, r14, &(0x7f0000000040), 0x4, &(0x7f0000000b00))
sendmsg$key(r16, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r18, @ANYRESDEC=r19]], 0xfffffffffffffe56}}, 0x20004850)
r20 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r21 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27)
r22 = dup2(r21, r20)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r22, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
r23 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r23)
r24 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r25=>0xffffffffffffffff})
getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r26 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
writev(r26, &(0x7f0000000900)=[{&(0x7f0000000d40)="f9fd9e7d96c6d812d08c525187bddcfdbe09c74978d31ac33ad4c0d90aa376a907bce26a502ae2403ad24f8d48773dfafb9f6ddabe8ac5c091d0329673a3bc6aab2aa8be0386af70d2e5f4dde9356a804c1c3e9057b03bfd27695c752c5723a8b1968e00dd040000003a100e6575124cf06586399a105a888faa8ecd57bef2547d181da0e3b67e50846bf25c35cdbb755e40ac6bd8d01a598f2afcaf50dc2b969e6600c51d49a4b1fa30dc4d275a6beafb6c42474d947121bae099faf7ff2e06225a074f821a6d4a08576eac29988a47f88b21da61df3ac3893810de53e254ec89c1eb19a1de073c6ad8e452c991f67007b6f27ebe62d9bd3646bca360b9d5de4686a92f18aa40bd3e53bc13966f"}, {&(0x7f0000000a00)="aa569e3bf2b03b68c3ea8388d4a91a6df2ec7ccd24b3313c69ff4474d35dcf480dc912d299228515bb8662e320bba0d1feb227eedb9c87b8d6f224b31954dd7b517e15b89ea5ff7567d4be259722328a2b0e1c231983420697279917fbbccaff79962876e840e7df6ec74dce5daec6ef55b585bf2d8c7fb9086e6f67068f349d5f0900f62c02e7f2f304cc581f715d6e32b5149278b777403df8fe1b8615c0d60cba1e594ddc06f9e41f8df6738c9494f59bce2300feb292c0ade25c7522217e12da91c9a4c5d93e9b7677ddb799b866086c3a327e6d8014000fbea11e4119fc9035c8", 0x112}, {&(0x7f0000000bc0)="818e4f40430bae5993b169ea30a4299c3c6ac96331243791d88cde71688d6dac799e066741f083f368487ff564cf95b9cbefd4a233f8d4bc796d1e224c167f40d2ac4f5722c39bffd3270d365d9bb4e9c6385c97fe0538bec1bdb448a899c3"}, {&(0x7f00000005c0)="b5f8b3f49c71600edf19", 0x9f}], 0x10000000000001ca)
ioctl$SG_GET_REQUEST_TABLE(r24, 0x227d, &(0x7f0000000780))
kcmp(r23, r19, 0x0, 0xffffffffffffffff, r24)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, <r27=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x4, 0x4, 0x0, 0x10002}, &(0x7f00000009c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x79c9e9235c799199)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r19, r22, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={<r28=>r14, r15, 0x0, 0x1, &(0x7f0000000080)='\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r12, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r11, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r28, r10, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r9, r8, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r27}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r27}, 0xc)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r27}, 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r6, r7, 0x0, 0x9, &(0x7f0000000200)='/dev/kvm\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, r5, 0x0, 0x82, &(0x7f00000000c0)='m\x06\x00j\x00y.\x02ven\x01\x04\x00\xf1\xbb\xfc4\xd4-,\x91\xa1\xecz\x9f%\xc3\xe9\xd8\xf0h0\xd3\xa8\xaaYig\xc8\xba\x85\x8f\xb8\xb5x\xd0|&\x01\xdf\xef=\xb8Q\x1c\xfeD#\xa1k\t\x86\xc2\x89)\xd8N\xf5\x8b8\xb3\xb6kzk\xd4W\x8a.\xc9ssH\xa0g\x87\xc5h_\xa1\xa1W\xbc\x93\xf9V\xa7\x8a\xc2\xb1\xe6\x8c\x82I_\x04\x1e\x84\xc1\x9d\x8eWl%X\x9d\x10\xed\xd9fpjU\xc6\x88\x85\xc8\xf6\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='v#\x00', r27}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={<r29=>0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r27}, 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r29, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10)
connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

20:02:30 executing program 4:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0)
write(0xffffffffffffffff, &(0x7f0000000100)="220000001500070500e80000004c03050204030303000000080003", 0x1b)
r0 = socket(0x10, 0x80002, 0x0)
sendmmsg$alg(r0, &(0x7f0000000180), 0x572, 0x0)

20:02:30 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  748.078547][T12691] FAULT_INJECTION: forcing a failure.
[  748.078547][T12691] name failslab, interval 1, probability 0, space 0, times 0
[  748.091328][T12691] CPU: 0 PID: 12691 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  748.101316][T12691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  748.111474][T12691] Call Trace:
[  748.114793][T12691]  dump_stack+0x197/0x210
[  748.119849][T12691]  should_fail.cold+0xa/0x10
[  748.124469][T12691]  ? is_bpf_text_address+0xac/0x160
[  748.129690][T12691]  ? setup_fault_attr+0x220/0x220
[  748.134743][T12691]  __should_failslab+0x121/0x190
[  748.139715][T12691]  should_failslab+0x9/0x14
[  748.144236][T12691]  kmem_cache_alloc+0x47/0x710
[  748.149024][T12691]  ? lock_acquire+0x190/0x410
[  748.153711][T12691]  ? net_tx_action+0xd30/0xd30
[  748.158491][T12691]  skb_clone+0x154/0x3d0
[  748.162751][T12691]  dev_queue_xmit_nit+0x3a1/0xaa0
[  748.167806][T12691]  dev_hard_start_xmit+0xbb/0x9b0
[  748.172854][T12691]  ? validate_xmit_skb_list+0xfc/0x150
[  748.178344][T12691]  sch_direct_xmit+0x372/0xd30
[  748.183142][T12691]  ? dev_watchdog+0xca0/0xca0
[  748.187838][T12691]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  748.193422][T12691]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  748.199527][T12691]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  748.205789][T12691]  ? sfb_dequeue+0x421/0x4d0
[  748.210404][T12691]  __qdisc_run+0x4bf/0x1770
[  748.214936][T12691]  __dev_queue_xmit+0x1650/0x35c0
[  748.219993][T12691]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  748.225310][T12691]  ? mark_held_locks+0xf0/0xf0
[  748.230094][T12691]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  748.236345][T12691]  ? debug_smp_processor_id+0x33/0x18a
[  748.241831][T12691]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  748.248092][T12691]  ? rcu_read_lock_held_common+0xbd/0x130
[  748.253837][T12691]  dev_queue_xmit+0x18/0x20
[  748.258359][T12691]  ? dev_queue_xmit+0x18/0x20
[  748.263053][T12691]  neigh_direct_output+0x16/0x20
[  748.268003][T12691]  ip6_finish_output2+0x109a/0x25c0
[  748.273264][T12691]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  748.278831][T12691]  ? lock_downgrade+0x920/0x920
[  748.283708][T12691]  ? netif_rx_ni+0x670/0x670
[  748.288323][T12691]  ? __kasan_check_read+0x11/0x20
[  748.293376][T12691]  __ip6_finish_output+0x444/0xaa0
[  748.298502][T12691]  ? __ip6_finish_output+0x444/0xaa0
[  748.303809][T12691]  ip6_finish_output+0x38/0x1f0
[  748.308674][T12691]  ip6_output+0x25e/0x880
[  748.313016][T12691]  ? ip6_finish_output+0x1f0/0x1f0
[  748.318172][T12691]  ? __ip6_finish_output+0xaa0/0xaa0
[  748.323484][T12691]  ? ip6_make_skb+0x370/0x570
[  748.328182][T12691]  ? ip_reply_glue_bits+0xc0/0xc0
[  748.333230][T12691]  ip6_local_out+0xbb/0x1b0
[  748.337783][T12691]  ip6_send_skb+0xbb/0x350
[  748.342573][T12691]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  748.348316][T12691]  ? ip6_forward_finish+0x570/0x570
[  748.354934][T12691]  udpv6_sendmsg+0x22f3/0x2b30
[  748.359731][T12691]  ? __kasan_check_write+0x14/0x20
[  748.365216][T12691]  ? ip_reply_glue_bits+0xc0/0xc0
[  748.371338][T12691]  ? udp_v6_get_port+0x6b0/0x6b0
[  748.376383][T12691]  ? __kasan_check_read+0x11/0x20
[  748.381427][T12691]  ? mark_lock+0xc2/0x1220
[  748.385860][T12691]  ? __kasan_check_read+0x11/0x20
[  748.390892][T12691]  ? mark_lock+0xc2/0x1220
[  748.395342][T12691]  ? __kasan_check_read+0x11/0x20
[  748.400393][T12691]  ? ___might_sleep+0x163/0x2c0
[  748.405278][T12691]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  748.410920][T12691]  ? aa_sk_perm+0x346/0xb00
[  748.415472][T12691]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  748.421043][T12691]  inet6_sendmsg+0x9e/0xe0
[  748.425479][T12691]  ? inet6_sendmsg+0x9e/0xe0
[  748.430243][T12691]  ? inet6_ioctl+0x1c0/0x1c0
[  748.434855][T12691]  sock_sendmsg+0xd7/0x130
[  748.439291][T12691]  ____sys_sendmsg+0x358/0x880
[  748.444084][T12691]  ? kernel_sendmsg+0x50/0x50
[  748.448792][T12691]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  748.454548][T12691]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  748.460551][T12691]  ? find_held_lock+0x35/0x130
[  748.465352][T12691]  ___sys_sendmsg+0x100/0x170
[  748.470054][T12691]  ? sendmsg_copy_msghdr+0x70/0x70
[  748.475183][T12691]  ? __kasan_check_read+0x11/0x20
[  748.475199][T12691]  ? __might_fault+0x12b/0x1e0
[  748.475211][T12691]  ? find_held_lock+0x35/0x130
[  748.475224][T12691]  ? __might_fault+0x12b/0x1e0
[  748.475238][T12691]  ? do_dup2+0x4f0/0x4f0
[  748.475252][T12691]  ? lock_downgrade+0x920/0x920
[  748.475273][T12691]  ? ___might_sleep+0x163/0x2c0
[  748.475287][T12691]  __sys_sendmmsg+0x1bf/0x4d0
[  748.475303][T12691]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  748.475332][T12691]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  748.475346][T12691]  ? fput_many+0x12c/0x1a0
20:02:30 executing program 4:
r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x14}, 0x10)
ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000002c0)={0xfffffffa, 0x5, 0x7, 0xa9, 0x9})
perf_event_open(&(0x7f0000000040)={0x1, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000380)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000080)={[], [{@rootcontext={'rootcontex,', 0x3d, 'unconfined_u'}}]})
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x42, 0xaafd70c, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840313f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f00000001c0), &(0x7f0000000040)}, 0x28)
uselib(&(0x7f0000000300)='./file0\x00')
r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x200000, 0x0)
write$UHID_CREATE(r2, &(0x7f00000004c0)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000440)=""/128, 0x80, 0x5, 0x7f, 0x7ff, 0x4, 0x7}}, 0x120)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f00000003c0))
gettid()

20:02:30 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:30 executing program 0:
r0 = socket$inet(0x2, 0x2000080001, 0x84)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x9, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000200)={0x5, 0x9, 0x5, 0x8000}, &(0x7f0000000240)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x6}}, 0x10)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@rc={0x1f, {0xb2, 0x5, 0xc7, 0x81, 0x81, 0x6}, 0x5}, {&(0x7f00000003c0)=""/157, 0x9d}, &(0x7f0000000480), 0x8}, 0xa0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000600)={0x9e0000, 0x200, 0x2e4, <r4=>0xffffffffffffffff, 0x0, &(0x7f00000005c0)={0x1aa14cf, 0x0, [], @p_u8=&(0x7f0000000580)=0x31}})
ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000640)={0x0, @default, @netrom={'nr', 0x0}, 0x8, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]})
flock(r3, 0x8)
sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)="e6", 0x5a}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="1000007ebf00000084000000070000008914da14bb000000"], 0x18}, 0x44)

[  748.475362][T12691]  ? fput+0x1b/0x20
[  748.475382][T12691]  ? ksys_write+0x1cf/0x290
[  748.529070][T12691]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  748.529088][T12691]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  748.529104][T12691]  ? do_syscall_64+0x26/0x790
[  748.529118][T12691]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  748.529132][T12691]  ? do_syscall_64+0x26/0x790
[  748.529152][T12691]  __x64_sys_sendmmsg+0x9d/0x100
[  748.529171][T12691]  do_syscall_64+0xfa/0x790
[  748.529188][T12691]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  748.529201][T12691] RIP: 0033:0x45a919
[  748.529229][T12691] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  748.529237][T12691] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  748.529250][T12691] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  748.529265][T12691] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
20:02:30 executing program 3 (fault-call:2 fault-nth:42):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  748.579328][T12691] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  748.579338][T12691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  748.579348][T12691] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:02:30 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  748.687774][T12706] FAULT_INJECTION: forcing a failure.
[  748.687774][T12706] name failslab, interval 1, probability 0, space 0, times 0
[  748.701200][T12706] CPU: 1 PID: 12706 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  748.711563][T12706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  748.721720][T12706] Call Trace:
[  748.725233][T12706]  dump_stack+0x197/0x210
[  748.729593][T12706]  should_fail.cold+0xa/0x10
20:02:30 executing program 0:
r0 = dup(0xffffffffffffffff)
ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040))
perf_event_open(&(0x7f000001d000)={0x1, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x803, 0xa5)
r2 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xcc000014, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad22780648c6394fb0400fc0010000b400c000200053582c137153e370900018025643d00d1bd", 0x2e}], 0x1}, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x2}}, 0xe8)
sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0)

[  748.734308][T12706]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  748.739625][T12706]  ? setup_fault_attr+0x220/0x220
[  748.744765][T12706]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  748.750169][T12706]  __should_failslab+0x121/0x190
[  748.755144][T12706]  should_failslab+0x9/0x14
[  748.759771][T12706]  kmem_cache_alloc+0x47/0x710
[  748.764562][T12706]  ? __kasan_check_read+0x11/0x20
[  748.769627][T12706]  skb_clone+0x154/0x3d0
[  748.773903][T12706]  ip6_finish_output2+0x18be/0x25c0
[  748.779135][T12706]  ? ip6_mtu+0x2e6/0x450
[  748.783501][T12706]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  748.789334][T12706]  ? lock_downgrade+0x920/0x920
[  748.794222][T12706]  ? rcu_read_lock_held+0x9c/0xb0
[  748.799273][T12706]  ? __kasan_check_read+0x11/0x20
[  748.804338][T12706]  __ip6_finish_output+0x444/0xaa0
[  748.809818][T12706]  ? __ip6_finish_output+0x444/0xaa0
[  748.815136][T12706]  ip6_finish_output+0x38/0x1f0
[  748.820007][T12706]  ip6_output+0x25e/0x880
[  748.824370][T12706]  ? ip6_finish_output+0x1f0/0x1f0
[  748.827912][T12711] netlink: 'syz-executor.0': attribute type 2 has an invalid length.
[  748.829513][T12706]  ? __ip6_finish_output+0xaa0/0xaa0
[  748.829527][T12706]  ? ip6_make_skb+0x370/0x570
[  748.829544][T12706]  ? ip_reply_glue_bits+0xc0/0xc0
[  748.829565][T12706]  ip6_local_out+0xbb/0x1b0
[  748.829595][T12706]  ip6_send_skb+0xbb/0x350
[  748.829619][T12706]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  748.868066][T12706]  ? ip6_forward_finish+0x570/0x570
[  748.873310][T12706]  udpv6_sendmsg+0x22f3/0x2b30
[  748.878377][T12706]  ? __kasan_check_write+0x14/0x20
[  748.883659][T12706]  ? ip_reply_glue_bits+0xc0/0xc0
[  748.888907][T12706]  ? udp_v6_get_port+0x6b0/0x6b0
[  748.894597][T12706]  ? __kasan_check_read+0x11/0x20
[  748.899647][T12706]  ? mark_lock+0xc2/0x1220
[  748.904103][T12706]  ? __kasan_check_read+0x11/0x20
[  748.909246][T12706]  ? mark_lock+0xc2/0x1220
[  748.913681][T12706]  ? __kasan_check_read+0x11/0x20
[  748.918820][T12706]  ? ___might_sleep+0x163/0x2c0
[  748.923696][T12706]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  748.929347][T12706]  ? aa_sk_perm+0x346/0xb00
[  748.933891][T12706]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  748.939463][T12706]  inet6_sendmsg+0x9e/0xe0
[  748.943884][T12706]  ? inet6_sendmsg+0x9e/0xe0
[  748.943901][T12706]  ? inet6_ioctl+0x1c0/0x1c0
[  748.943916][T12706]  sock_sendmsg+0xd7/0x130
[  748.943935][T12706]  ____sys_sendmsg+0x358/0x880
[  748.957067][T12711] netlink: 'syz-executor.0': attribute type 2 has an invalid length.
[  748.957701][T12706]  ? kernel_sendmsg+0x50/0x50
[  748.970644][T12706]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  748.970660][T12706]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  748.970672][T12706]  ? find_held_lock+0x35/0x130
[  748.970697][T12706]  ___sys_sendmsg+0x100/0x170
[  748.987134][T12706]  ? sendmsg_copy_msghdr+0x70/0x70
[  749.001888][T12706]  ? __kasan_check_read+0x11/0x20
[  749.006937][T12706]  ? __might_fault+0x12b/0x1e0
[  749.011720][T12706]  ? find_held_lock+0x35/0x130
[  749.016918][T12706]  ? __might_fault+0x12b/0x1e0
[  749.021685][T12706]  ? do_dup2+0x4f0/0x4f0
[  749.021703][T12706]  ? lock_downgrade+0x920/0x920
[  749.021727][T12706]  ? ___might_sleep+0x163/0x2c0
[  749.021747][T12706]  __sys_sendmmsg+0x1bf/0x4d0
[  749.040586][T12706]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  749.045973][T12706]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  749.052503][T12706]  ? fput_many+0x12c/0x1a0
[  749.057022][T12706]  ? fput+0x1b/0x20
[  749.061132][T12706]  ? ksys_write+0x1cf/0x290
[  749.061153][T12706]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  749.061168][T12706]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  749.061188][T12706]  ? do_syscall_64+0x26/0x790
[  749.071337][T12706]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  749.071352][T12706]  ? do_syscall_64+0x26/0x790
[  749.071379][T12706]  __x64_sys_sendmmsg+0x9d/0x100
[  749.097303][T12706]  do_syscall_64+0xfa/0x790
[  749.102008][T12706]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  749.107924][T12706] RIP: 0033:0x45a919
[  749.112212][T12706] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  749.132400][T12706] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  749.140939][T12706] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  749.149195][T12706] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  749.157677][T12706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  749.165845][T12706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  749.173838][T12706] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  751.728662][    C0] net_ratelimit: 18 callbacks suppressed
[  751.734488][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  751.740519][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  753.328828][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  753.334695][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  753.340571][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  753.346352][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  753.352297][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  753.358097][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  753.363943][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  753.369758][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:39 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00')
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180), 0x4)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x5}, 0x20)
r2 = socket$inet6(0xa, 0x2, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c)
sendmmsg(r2, &(0x7f00000092c0), 0x105, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000080)=0x8, 0x1)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000000))

20:02:39 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:39 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:39 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
bind$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x3, @local}}, 0x1e)
getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b185fb9395d584b}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r2}]]}}}]}, 0x40}}, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000540)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c0042002800010000000000000000000000000000000000affe00000000000000000000ff01000000000000"], 0x58}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r6, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r8, 0x0)
setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x0, 0x4e20, 0x4, 0x2, 0x80, 0x27e02262f17f89d7, 0x89, r6, r8}, {0x6538, 0x6, 0x7fffffff, 0x6, 0x2, 0x10000, 0x81c1, 0x3}, {0x7, 0x1, 0x2d41, 0x3ff}, 0x6, 0x6e6bbd, 0x3, 0x1, 0x7}, {{@in6=@local, 0x4d2, 0x3c}, 0xa, @in=@local, 0x3500, 0x2, 0x1, 0x20, 0x81, 0x3b, 0x10000}}, 0xe8)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$VIDIOC_TRY_EXT_CTRLS(r9, 0xc0205649, &(0x7f0000000480)={0x9f0000, 0x5, 0x4, <r10=>r4, 0x0, &(0x7f0000000440)={0x990a73, 0x9, [], @string=&(0x7f0000000380)=0x6}})
ioctl$KDFONTOP_SET_DEF(r10, 0x4b72, &(0x7f00000004c0)={0x2, 0x0, 0xe, 0x1c, 0x62, &(0x7f0000000580)="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"})

20:02:39 executing program 0:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0)
mkdir(&(0x7f00000002c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), 0x8)
r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000100))
r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x20040, 0x0)
ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, 0x0)
write$cgroup_pid(r3, &(0x7f0000000300), 0x12)
r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0)
preadv(r6, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0)
setxattr$security_smack_transmute(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8)
setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), 0x8)
modify_ldt$write2(0x11, &(0x7f0000000140)={0x1, 0x20101000, 0x2000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10)
dup2(r7, 0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)

20:02:39 executing program 3 (fault-call:2 fault-nth:43):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  757.377527][T12737] netlink: 'syz-executor.4': attribute type 8 has an invalid length.
[  757.393978][T12736] FAULT_INJECTION: forcing a failure.
[  757.393978][T12736] name failslab, interval 1, probability 0, space 0, times 0
[  757.434258][T12737] IPv6: sit1: Disabled Multicast RS
[  757.458791][T12736] CPU: 1 PID: 12736 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  757.468741][T12736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  757.478815][T12736] Call Trace:
[  757.478842][T12736]  dump_stack+0x197/0x210
[  757.478864][T12736]  should_fail.cold+0xa/0x10
[  757.478884][T12736]  ? setup_fault_attr+0x220/0x220
[  757.478903][T12736]  ? ___might_sleep+0x163/0x2c0
[  757.478923][T12736]  __should_failslab+0x121/0x190
[  757.478951][T12736]  should_failslab+0x9/0x14
[  757.488622][    C0] net_ratelimit: 12 callbacks suppressed
[  757.488630][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  757.491193][T12736]  kmem_cache_alloc_node_trace+0x274/0x750
[  757.496253][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  757.501047][T12736]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  757.501062][T12736]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  757.501080][T12736]  __kmalloc_node_track_caller+0x3d/0x70
[  757.501100][T12736]  __kmalloc_reserve.isra.0+0x40/0xf0
[  757.501119][T12736]  __alloc_skb+0x10b/0x5e0
[  757.501140][T12736]  ? __kmalloc_reserve.isra.0+0xf0/0xf0
[  757.506151][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  757.510572][T12736]  alloc_skb_with_frags+0x93/0x590
[  757.510589][T12736]  ? find_held_lock+0x35/0x130
[  757.510611][T12736]  sock_alloc_send_pskb+0x7ad/0x920
[  757.510635][T12736]  ? sock_wmalloc+0x120/0x120
[  757.516310][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  757.522094][T12736]  ? __local_bh_enable_ip+0x15a/0x270
[  757.522115][T12736]  ? ip6_finish_output2+0x1106/0x25c0
[  757.522133][T12736]  ? ip6_mtu+0x2e6/0x450
[  757.528114][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  757.533751][T12736]  ? find_held_lock+0x35/0x130
[  757.533772][T12736]  sock_alloc_send_skb+0x32/0x40
[  757.533791][T12736]  __ip6_append_data.isra.0+0x1e94/0x3b60
[  757.533812][T12736]  ? ip_reply_glue_bits+0xc0/0xc0
[  757.539896][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  757.545972][T12736]  ? ip6_setup_cork+0x1920/0x1920
[  757.551750][    C0] protocol 88fb is buggy, dev hsr_slave_0
20:02:39 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  757.556944][T12736]  ? ip6_flush_pending_frames+0xd0/0xd0
[  757.561406][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  757.566877][T12736]  ? __kasan_check_read+0x11/0x20
[  757.577671][T12736]  ip6_make_skb+0x32f/0x570
[  757.577688][T12736]  ? ip_reply_glue_bits+0xc0/0xc0
[  757.577708][T12736]  ? ip_reply_glue_bits+0xc0/0xc0
[  757.577725][T12736]  ? ip6_push_pending_frames+0xf0/0xf0
[  757.577746][T12736]  ? ip6_sk_dst_lookup_flow+0x55e/0xb00
[  757.587690][T12736]  ? ip6_forward_finish+0x570/0x570
[  757.587706][T12736]  ? rcu_read_lock_held+0x9c/0xb0
[  757.587730][T12736]  udpv6_sendmsg+0x22a1/0x2b30
[  757.587751][T12736]  ? _raw_spin_unlock_irq+0x23/0x80
[  757.587771][T12736]  ? ip_reply_glue_bits+0xc0/0xc0
[  757.598154][T12736]  ? udp_v6_get_port+0x6b0/0x6b0
[  757.598172][T12736]  ? __kasan_check_read+0x11/0x20
[  757.598188][T12736]  ? mark_lock+0xc2/0x1220
[  757.598211][T12736]  ? __kasan_check_read+0x11/0x20
[  757.608934][T12736]  ? mark_lock+0xc2/0x1220
[  757.608960][T12736]  ? ___might_sleep+0x163/0x2c0
[  757.608985][T12736]  ? debug_lockdep_rcu_enabled+0x71/0xa0
20:02:39 executing program 3 (fault-call:2 fault-nth:44):
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[  757.609002][T12736]  ? aa_sk_perm+0x346/0xb00
[  757.609039][T12736]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  757.609064][T12736]  inet6_sendmsg+0x9e/0xe0
[  757.619015][T12736]  ? inet6_sendmsg+0x9e/0xe0
[  757.619037][T12736]  ? inet6_ioctl+0x1c0/0x1c0
[  757.619054][T12736]  sock_sendmsg+0xd7/0x130
[  757.619070][T12736]  ____sys_sendmsg+0x358/0x880
[  757.619087][T12736]  ? kernel_sendmsg+0x50/0x50
[  757.619102][T12736]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  757.619121][T12736]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  757.628783][T12736]  ? find_held_lock+0x35/0x130
[  757.628810][T12736]  ___sys_sendmsg+0x100/0x170
[  757.628829][T12736]  ? sendmsg_copy_msghdr+0x70/0x70
[  757.628846][T12736]  ? __kasan_check_read+0x11/0x20
[  757.628865][T12736]  ? __might_fault+0x12b/0x1e0
[  757.628879][T12736]  ? find_held_lock+0x35/0x130
[  757.628894][T12736]  ? __might_fault+0x12b/0x1e0
[  757.628914][T12736]  ? do_dup2+0x4f0/0x4f0
[  757.639971][T12736]  ? lock_downgrade+0x920/0x920
[  757.640000][T12736]  ? ___might_sleep+0x163/0x2c0
[  757.640019][T12736]  __sys_sendmmsg+0x1bf/0x4d0
[  757.640044][T12736]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  757.640081][T12736]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  757.650843][T12736]  ? fput_many+0x12c/0x1a0
[  757.650862][T12736]  ? fput+0x1b/0x20
[  757.650878][T12736]  ? ksys_write+0x1cf/0x290
[  757.650900][T12736]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  757.650915][T12736]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  757.650930][T12736]  ? do_syscall_64+0x26/0x790
[  757.650944][T12736]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
20:02:40 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  757.650957][T12736]  ? do_syscall_64+0x26/0x790
[  757.650979][T12736]  __x64_sys_sendmmsg+0x9d/0x100
[  757.650998][T12736]  do_syscall_64+0xfa/0x790
[  757.651015][T12736]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  757.651026][T12736] RIP: 0033:0x45a919
[  757.651042][T12736] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  757.651049][T12736] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  757.662299][T12736] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  757.662307][T12736] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  757.662315][T12736] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  757.662325][T12736] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  757.662333][T12736] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
[  757.795958][T12741] FAULT_INJECTION: forcing a failure.
20:02:40 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  757.795958][T12741] name failslab, interval 1, probability 0, space 0, times 0
[  758.014860][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  758.014905][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  758.045554][T12741] CPU: 0 PID: 12741 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  758.056102][T12741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  758.066261][T12741] Call Trace:
[  758.066284][T12741]  dump_stack+0x197/0x210
[  758.066309][T12741]  should_fail.cold+0xa/0x10
[  758.066326][T12741]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  758.066341][T12741]  ? setup_fault_attr+0x220/0x220
[  758.066361][T12741]  ? ipv6_chk_mcast_addr+0x2cb/0x6e0
[  758.088865][T12741]  __should_failslab+0x121/0x190
[  758.088888][T12741]  should_failslab+0x9/0x14
[  758.088909][T12741]  kmem_cache_alloc+0x47/0x710
[  758.088924][T12741]  ? __kasan_check_read+0x11/0x20
[  758.088945][T12741]  skb_clone+0x154/0x3d0
[  758.088966][T12741]  ip6_finish_output2+0x18be/0x25c0
[  758.122884][T12741]  ? ip6_mtu+0x2e6/0x450
[  758.127155][T12741]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  758.132720][T12741]  ? lock_downgrade+0x920/0x920
[  758.137602][T12741]  ? rcu_read_lock_held+0x9c/0xb0
[  758.142659][T12741]  ? __kasan_check_read+0x11/0x20
[  758.147708][T12741]  __ip6_finish_output+0x444/0xaa0
[  758.157964][T12741]  ? __ip6_finish_output+0x444/0xaa0
[  758.163286][T12741]  ip6_finish_output+0x38/0x1f0
[  758.168177][T12741]  ip6_output+0x25e/0x880
[  758.172603][T12741]  ? ip6_finish_output+0x1f0/0x1f0
[  758.177743][T12741]  ? __ip6_finish_output+0xaa0/0xaa0
[  758.183035][T12741]  ? ip6_make_skb+0x370/0x570
[  758.187715][T12741]  ? ip_reply_glue_bits+0xc0/0xc0
[  758.192766][T12741]  ip6_local_out+0xbb/0x1b0
[  758.197289][T12741]  ip6_send_skb+0xbb/0x350
[  758.201730][T12741]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  758.207211][T12741]  ? ip6_forward_finish+0x570/0x570
[  758.212446][T12741]  udpv6_sendmsg+0x22f3/0x2b30
[  758.217234][T12741]  ? __kasan_check_write+0x14/0x20
[  758.222369][T12741]  ? ip_reply_glue_bits+0xc0/0xc0
[  758.227422][T12741]  ? udp_v6_get_port+0x6b0/0x6b0
[  758.232408][T12741]  ? __kasan_check_read+0x11/0x20
[  758.237554][T12741]  ? mark_lock+0xc2/0x1220
[  758.242003][T12741]  ? __kasan_check_read+0x11/0x20
[  758.247039][T12741]  ? mark_lock+0xc2/0x1220
[  758.251559][T12741]  ? __kasan_check_read+0x11/0x20
[  758.256781][T12741]  ? ___might_sleep+0x163/0x2c0
[  758.261709][T12741]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  758.268071][T12741]  ? aa_sk_perm+0x346/0xb00
[  758.272703][T12741]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  758.278280][T12741]  inet6_sendmsg+0x9e/0xe0
[  758.282812][T12741]  ? inet6_sendmsg+0x9e/0xe0
[  758.287421][T12741]  ? inet6_ioctl+0x1c0/0x1c0
[  758.292029][T12741]  sock_sendmsg+0xd7/0x130
[  758.296830][T12741]  ____sys_sendmsg+0x358/0x880
[  758.301662][T12741]  ? kernel_sendmsg+0x50/0x50
[  758.306351][T12741]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  758.311928][T12741]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  758.317943][T12741]  ? find_held_lock+0x35/0x130
[  758.322737][T12741]  ___sys_sendmsg+0x100/0x170
[  758.327449][T12741]  ? sendmsg_copy_msghdr+0x70/0x70
[  758.332771][T12741]  ? __kasan_check_read+0x11/0x20
[  758.337818][T12741]  ? __might_fault+0x12b/0x1e0
[  758.342592][T12741]  ? find_held_lock+0x35/0x130
[  758.347372][T12741]  ? __might_fault+0x12b/0x1e0
[  758.352152][T12741]  ? do_dup2+0x4f0/0x4f0
[  758.356409][T12741]  ? lock_downgrade+0x920/0x920
[  758.361285][T12741]  ? ___might_sleep+0x163/0x2c0
[  758.366153][T12741]  __sys_sendmmsg+0x1bf/0x4d0
[  758.370875][T12741]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  758.375933][T12741]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  758.382193][T12741]  ? fput_many+0x12c/0x1a0
[  758.386626][T12741]  ? fput+0x1b/0x20
[  758.390481][T12741]  ? ksys_write+0x1cf/0x290
[  758.395017][T12741]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  758.400798][T12741]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  758.406540][T12741]  ? do_syscall_64+0x26/0x790
[  758.411323][T12741]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  758.417410][T12741]  ? do_syscall_64+0x26/0x790
[  758.422109][T12741]  __x64_sys_sendmmsg+0x9d/0x100
[  758.427239][T12741]  do_syscall_64+0xfa/0x790
[  758.431782][T12741]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  758.437688][T12741] RIP: 0033:0x45a919
[  758.441620][T12741] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
20:02:40 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  758.461256][T12741] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  758.469686][T12741] RAX: ffffffffffffffda RBX: 00007f160d5e3c90 RCX: 000000000045a919
[  758.477892][T12741] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  758.486422][T12741] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  758.494408][T12741] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f160d5e46d4
[  758.502407][T12741] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 0000000000000004
20:02:40 executing program 4:
syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0)
syz_mount_image$cifs(&(0x7f0000000080)='cifs\x00', &(0x7f00000000c0)='./file0\x00', 0x100000001, 0x3, &(0x7f0000000480)=[{&(0x7f0000000500)="f870cb00eef43c0bc1cb0b636d57ec7dfc75bd9f25223550d28dc3117f01d2d31b62e311e631a84c6c69e4597dc05c9ff08007cde7174d480645671df2680eede0b9a001645b7fb4d8c38bf461f99b92a9ac0e63439aa4facb20daa321564ebe266b5c709b07eaa9ce3de537b744bc83aba03c831ef77f2475960996fb343c11e443939ade97839c062fd23e2f6ee161aae08f087e89ba64b22c7e07627f486cc29a5ad2a9f2c4550de992a79d8d2fef00000000000000", 0xb7, 0xe}, {&(0x7f00000002c0)="a5e597f224188db15c780eaca101d1748acefdc1c109e3b9947556c912e81e84a62f58acc365d6ef14eb6e201b3faf1ba4b918930e39885ffeaf420e3d9b81009aef8e0cc5d545ae03cb32515646f3d472d40deb337126c95df53bafba1ab5efae05743106210b1faa4f800ee54d4431a2188f9540ba9b272eed84c5550fa7a0ed3806f480c1a1379e3de7b793c846ef3ba342fe2b79e5300d64297e5a45257556e08ffc2cffb8529d8a683c23ef0688b4161f620beac906319c057159de9c8348d5792d3ccd482d9023df1eeaf4ae2d095d17125455fb0186ae5c4da52f46d716", 0xe1, 0x4}, {&(0x7f00000003c0)="ed1bc85e15168369782c8d202939f4da2fd974ed4eea0d35e5b0db980f136489086c5c5d14e68d2bc4a3e611cf0210197bd9c9ca3e3bcdf16b41f69866bdd171d2623149120379bad25a246e4a1eaa41bbc2411711e1bc0a135a68d0571c0908e35f2e43ff6754936a995f7482fd64e3164ae82f36cf50218ad5dcf5beae989ffe3938f1223c7b1fb7698c7781313ff84d8feb20f60686d5d51560bb9d363aec0227a809b2a5", 0xa6, 0x8}], 0x40000, &(0x7f00000005c0)='/%\x00\x88\xfe\xbb1#\x9e')

[  763.728637][    C0] net_ratelimit: 20 callbacks suppressed
[  763.728644][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  763.740880][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  763.746953][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  763.752863][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  763.758867][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  763.764781][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  763.808709][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  763.814578][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  764.208636][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  764.214606][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:48 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

20:02:48 executing program 2:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:48 executing program 4:
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
read(0xffffffffffffffff, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {0x6}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd})
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0)
syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x0, 0x0, 0x40, &(0x7f0000001880)='vmnet1vmnet0)nodev^(ppp1em0&\x00')
ptrace(0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)

20:02:48 executing program 0:
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0)
io_setup(0xc01, &(0x7f0000000480)=<r1=>0x0)
io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="100000000f00"/16, 0x10}])
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000040))
write$P9_RLERROR(r2, &(0x7f0000000100)={0x9, 0x7, 0x2}, 0x9)

20:02:48 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:48 executing program 5:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(0xffffffffffffffff, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000000)="24000000100007031dff22946fa2830020200a", 0x13}], 0x1}, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
io_setup(0x83, &(0x7f00000003c0)=<r6=>0x0)
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x32600)
r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x200040, 0x0)
r11 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x2000, 0x0)
r12 = socket$rds(0x15, 0x5, 0x0)
r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r13, 0x40086602, &(0x7f0000000080))
r14 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/attr/current\x00', 0x2, 0x0)
io_submit(r6, 0x7, &(0x7f00000008c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x6, r7, &(0x7f00000001c0)="faff1ae6f1395a665ae6bad08d7704a0385fd90ef900cece9874bceb6e7e6a79a62848e5dc7720b0da1e702b537b60838d1804dd79a2f882e9cfeb2f99d2758e01a71bf598024c6452e75483bd3436f87756ef9302609c8eefd9c377bcaffbb6a6b8abfbca98f4b9ddb98413e18fe659e91685fda4e2762e1034aea50917ee0d7811e4c955805c06c00e40daaf9c98617b3f10649c91d65a8cc1b0444892cb260ec455661773a5a679b5e404f483153ce2c4dd07ea22234706a700da2f91b0e6fb", 0xc1, 0x4, 0x0, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x800, 0xffffffffffffffff, &(0x7f00000002c0)="7a3819fc1c24bed0a2b33de392d14f2b5b92aea8dbd1a084aea3fb34924cfe3f28d183dc99834352f23d8037e90424659912dbbf84d1bbfd3529eda3f82d0c58267215dd2a6fecdd2f21fa47a8ec24b91bd3e5f0f6f576d833ab49c70b3207a808f8ea5a793470c94bb455fb2414f639df50d6db070a1e14b432690c92de10e94d6e6f4f29134230c3601459e946121c3d6ea0480aa26dda73026460ed8bcebbaf83f918605f52237c3c33ada8de3f06344919a1dc4397da00fb65665269f2d698f11ad7c7f7d76539d53fac9b569077a6ba43093a5bfd3cd39491a61b9cb16f47d57ee2a7425c0de0d7fe", 0xeb, 0x6000000000000, 0x0, 0x3, r5}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x2, r8, &(0x7f0000000400)="dfc3e5c0fa8a93bca1c87358abaeefbf173b58dcf16b5a09e81a3cf863650de9369c16e2836343fd8aeb46d3998eaca23654d5ce1b2d960c4fb0c28d346b26f490a41393c44de7", 0x47, 0xe1d6, 0x0, 0x2, r9}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x3f, 0xffffffffffffffff, &(0x7f0000000480)="29b9c83937a0ecba870066c96a45a5a2efbe093a3ce793f0888757773f58b3a0548ddf097cfd928f2061219f6c6552f626560fafec1145d316f150a1934010800dd1b1a90520b7920241d136cef6b0d62c7e9a02fdb4bf6f6c9cea9abca89b1375a04c91e8174f", 0x67, 0x8, 0x0, 0x0, r10}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x3, 0x8001, r7, &(0x7f0000000580)="9f5b688374afff3fa7f7ff3312afc83341bf176899b58b436726e388b9994fb29ad9297a75b3deb8cd8cea0232577be8e55232ab09d755281d4e49c1aed88895f0947db88e6e161a1c4f83bf4f37babc64f0dbeb666af34b24cf23b157026591da79ba7b5fec1abee9a4fc128d8f0c400f22b5eb6419025b924a5c8b269f52ccd39156594992b3e683d3643aa6a527225db9adf298d065c7534e33a7667732a8d5c46440652ba67ff10f32644a2eafc29b", 0xb1, 0x7, 0x0, 0x3, r11}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x2, 0x4fc, r12, &(0x7f00000006c0)="38b1f81cfd8c948b6f84f39e04f0f6206746e2722bf1e082fdce6db891ea326682fad20c1e8ab36196163ebead407287bed465c3acba678ff2d8b5e03c666121114f852c84a33ee8ee6bd670f8e45faa5853d22510614e9d785b1a9c75e9cf87af4be45f94fc747424690031ef91f88430a18b9333297e4061344e6cc731a633d5386fd4346a92e4", 0x88, 0x272cd309, 0x0, 0x3, r13}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x3, 0x2, r14, &(0x7f0000000800)="8d0e9c3ee05c219843fc819b087e67e1b1dcb050c27388ceedf8ceaec587963564f4be020b83a48c708ccfc79d5fcd4c5e34231da2cf708ae1daf91c2a0fe364e4ed79fffac57f437b6f0f183380cb331295bef57900bc4e90849040f247d8614ef6e1c777848972c5e10f3bd6647df6aca21b2106b75ed9", 0x78, 0x404, 0x0, 0x0, r2}])
sendfile(r1, r2, 0x0, 0x8000fffffffe)
r15 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000900)='/dev/btrfs-control\x00', 0x80000, 0x0)
ioctl$SCSI_IOCTL_DOORLOCK(r15, 0x5380)

20:02:48 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:48 executing program 2:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x2, 0x0)

20:02:49 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r0, 0x4, 0xffffffffffffffff, 0x8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
pidfd_send_signal(r2, 0x13, &(0x7f00000001c0)={0x2f, 0x80, 0x3}, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0, <r3=>0x0})
r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0)
kcmp(r0, r3, 0x0, r4, 0xffffffffffffffff)
r5 = socket(0x2000000000000021, 0x2, 0x10000000000002)
r6 = socket(0x2000000000000021, 0x2, 0x10000000000002)
connect$rxrpc(r6, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24)
sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000)
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/hwrng\x00', 0x42000, 0x0)
setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000001c40)=0x5, 0x4)
r8 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000180)={0xf0, 0x40, 0x2, 0x3, 0x20, 0x0, 0x1, 0x3, 0x0, 0x20, 0x80, 0x58, 0x79, 0x8}, 0xe)
dup3(r5, r6, 0x0)

[  766.827764][T12790] ceph: No path or : separator in source
20:02:49 executing program 4:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000400)='./file0\x00', 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000080)=0x3, 0x8)
mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000040)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}]})

20:02:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x3, 0x0)

20:02:49 executing program 2:
r0 = socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, 0x0, 0x0, 0x0)

20:02:49 executing program 0:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8))
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000072f000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1})
syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="6b0e11b040e2f52f783db57c243605847217d59178a171c33013fc8299717346c826f2a07ef9518e41eb5e1f9445b30b1161e58a55e60a71f8bd8899f2ea386d7c946587d7ad52c19724cff5484d8eec5cf08bfad2e11c41b8ccdd8f65ed", 0x5e, 0x1f}], 0x10, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000f6bfe8))
ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x760000}, 0x8000})

20:02:49 executing program 4:
socket$nl_generic(0x10, 0x3, 0x10)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x3)
ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000280))
syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00')
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r1)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000cc000000cc000000030000000c00000000000007000000000400000005000084ffffffff0600000000000000080000000e00000003000000000000000300000002000000010000000c00000005000000b40900010f000000050000006c0000000d0000080000000e0400000001000000080000000000000e01000000010000000d00000000000008040000000500000008000006040000000e0000000300000004000000018000000f0000001c07000002000000080000000000000080000000050000000700000009000000000200000b00000005000000000000"], &(0x7f0000000180)=""/146, 0xe7, 0x92}, 0x20)
ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)

[  767.488943][T12837] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0.
[  769.968665][    C0] net_ratelimit: 20 callbacks suppressed
[  769.974862][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  769.980824][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  769.986636][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  769.992742][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  769.998659][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  770.004570][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  770.048831][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  770.054882][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  770.448678][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  770.454821][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:02:58 executing program 5:
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r1=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r1, 0x0)
getpgid(0x0)
clone3(&(0x7f0000000400)={0x84100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x50)
r2 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r2, 0x4, 0xffffffffffffffff, 0x8)
pidfd_open(r2, 0x0)
r3 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r3, 0x4, 0xffffffffffffffff, 0x10)
sched_setscheduler(r3, 0x0, &(0x7f0000000000)=0x7)

20:02:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, 0x0, 0x0, 0x0)

20:02:58 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x4, 0x0)

20:02:58 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:58 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080))
r0 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@map_off='map=off'}, {@check_strict='check=strict'}]})
r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x109580, 0x0)
ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000540)=""/52)
r2 = accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10, 0x80000)
ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000500)={0x4e, 0xad, 0xc, 0x4, 0x800, 0x81})
ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000007d180000fe58000000000000e53200000000000001000000000000000400000000000000000000000000000000000000000000000000000000000000600a00003f00000006000000000000001400000000000000010000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e06c6a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000033cb85d03b4075ab9cfec04624fa00"/832])

20:02:58 executing program 0:
socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]})
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'd\x00\x00\x00\xef\f\x00\x00\x00\x06\x00\x00\x00\x00\x02\x00', 0x0, 0x2}, {@broadcast, 0x4e24, 0x1, 0x0, 0x0, 0x7}}, 0xfffffffffffffe7b)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x7ff, 0x800)
ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000180)={{0x8, 0x8, 0x81, 0x0, 0x3f, 0x1f}, 0x0, 0x3, 0x8, 0x1, 0x9, "5159338792e69d641253cd8bbd721c07d5c0dda40b9f425200328ceb8e5750c68763993ceaa9aaff262d6fe86066dc8a43efec7d44522eee32bbcca17f2ea1e9e8ebe47e61291d7b84bd0eb1b3ddac288c30e96a0e34dc98c569a50d10d5d4dffaa4eacbf95e09722f78c89d5d621688948c36489a33e1d5f9b1eb44c9a68e6f"})
r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$get_security(0x11, r1, &(0x7f00000000c0), 0x0)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='rxrpc_s\x00', 0x0)

20:02:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup2(r0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, 0x0, 0x0, 0x0)

[  776.193507][T12863] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 9294)
[  776.208672][    C0] net_ratelimit: 20 callbacks suppressed
[  776.208680][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  776.220291][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  776.225802][T12863] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 1, start ffffffff)
[  776.226302][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  776.242723][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  776.249237][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  776.255273][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  776.277233][T12863] FAT-fs (loop0): Filesystem has been set read-only
20:02:58 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x5, 0x0)

20:02:58 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:02:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  776.288701][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  776.294549][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  776.330880][T12866] ISOFS: Unable to identify CD-ROM format.
20:02:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:02:58 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x6, 0x0)

[  776.688639][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  776.694495][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  782.448671][    C0] net_ratelimit: 20 callbacks suppressed
[  782.448679][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  782.460523][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  782.466545][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  782.472655][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  782.478665][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  782.484408][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  782.528717][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  782.534798][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  782.928696][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  782.934654][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:03:09 executing program 2:
socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:09 executing program 4:
unshare(0x8030400)
r0 = socket$pptp(0x18, 0x1, 0x2)
getpeername(r0, 0x0, &(0x7f0000000040))
r1 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000000))
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x2002, 0x24)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20102000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}]}, 0x54}, 0x1, 0x0, 0x0, 0x2404481b}, 0x8000)

20:03:09 executing program 0:
syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x50c02, 0x40)
setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3)
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)=0x460)

20:03:09 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:09 executing program 5:
r0 = socket(0x18, 0x2, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
bind(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @broadcast}, 0x4, 0x0, 0x1, 0x1}}, 0x80)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x7e00000}, 0xc)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b00080003006282c6f208001b0000000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000)

20:03:09 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x7, 0x0)

20:03:09 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:09 executing program 0:
r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3f, 0x111403)
syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000180)="2e0f01c50f01cbdb0bb9420800000f3266fd0fc76dde3e660f3a093bc90f20c035040000000f22c0d8fc8beb", 0x2c}], 0x1, 0x40, &(0x7f0000000200), 0x0)
ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)=""/163)
ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000140)={0x4})

20:03:09 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x8, 0x0)

20:03:09 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:09 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:09 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x9, 0x0)

20:03:09 executing program 4:
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
syz_init_net_socket$ax25(0x3, 0x5, 0xcf)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c4c3f64bfc180a3ef3719156353eec5f4d625d15d17b4b6f4dbefdfe4e1b860e24a9d68b577b268bff3afb1dc482b298e1c48bfd712d8174b2eea5030de671e9ec3952e2e3f7107bf44bb887a1ab36f5b23de5deb426980d1cf43373b4cc85e38f9afc18bd32e074efdf3dd172fe1d03ece6bc4d2f37ba2d4953e17f9045a983059632b5ab3142586b752c1d6809a098c347f4e696ea184df603d600135bbea5d7a906afc8f84aeb18774d512ba9a08fa0d1cf66da58a1c8d3da08c27fb735456cd8e6588198d16a5b6abf12b06906c2845efbd7ba3dc4e266e5a92a93eb7fd8d35b0a0032954fa2289327ded7b33d"], 0x3)
perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

[  787.970735][T12947] ptrace attach of "/root/syz-executor.1"[12946] was attempted by "/root/syz-executor.1"[12947]
20:03:10 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:10 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:10 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0xa, 0x0)

[  788.174397][T12958] ptrace attach of "/root/syz-executor.1"[12956] was attempted by "/root/syz-executor.1"[12958]
[  788.688695][    C0] net_ratelimit: 20 callbacks suppressed
[  788.688703][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  788.700423][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  788.706328][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  788.712194][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  788.718208][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  788.724164][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  788.768702][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  788.774598][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  789.168633][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  789.174482][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  794.928658][    C0] net_ratelimit: 20 callbacks suppressed
[  794.928666][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  794.940214][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  794.946016][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  794.951791][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  794.957581][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  794.963477][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  795.018742][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  795.025012][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  795.408634][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  795.415089][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:03:18 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$SCSI_IOCTL_SYNC(r0, 0x4)
r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0)
bind$bt_l2cap(r1, &(0x7f0000000200)={0x1f, 0x21}, 0xe)

20:03:18 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001840)={'vcan0\x00', <r1=>0x0})
r2 = socket$can_j1939(0x1d, 0x2, 0x7)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000001840)={'vcan0\x00', <r4=>0x0})
bind$can_j1939(r2, &(0x7f0000000240)={0x1d, r4}, 0x18)
connect$can_j1939(r2, &(0x7f0000000180)={0x1d, r1}, 0x18)
r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x40)
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0xfffffffffffffa4f, <r6=>0x0, 0x10001, 0x1f})
ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000080)={0xffffffffffffffc0, r6, 0x34cec277f1b5f995, 0x2})
r7 = dup(r2)
r8 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
ftruncate(r8, 0xb0bb)
sendfile(r7, r8, 0x0, 0x200800100000001)
r9 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r10 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r11=>0xffffffffffffffff})
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r12=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r12, 0x0)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, <r13=>0x0})
r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r14, 0x40086602, &(0x7f0000000080))
ioctl$TIOCGPGRP(r14, 0x540f, &(0x7f0000000800)=<r15=>0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r16=>0xffffffffffffffff})
getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r17=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r17, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0})
r19 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r20 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r21 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r22, 0x40086602, &(0x7f0000000080))
r23 = ioctl$TIOCGPTPEER(r22, 0x5441, 0x9)
r24 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r25 = openat$md(0xffffffffffffff9c, &(0x7f0000000900)='/dev/md0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r26=>0xffffffffffffffff})
getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r27=>0xffffffffffffffff})
getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r28 = syz_open_dev$dmmidi(&(0x7f0000000940)='/dev/dmmidi#\x00', 0x7f, 0x4cd80)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r29=>0xffffffffffffffff})
getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r30 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r30, 0x4, 0xffffffffffffffff, 0x8)
lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, <r31=>0x0})
fstat(r2, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, <r32=>0x0})
sendmmsg$unix(r7, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x1}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000001c0)="4fa37e757ca9c136b7e8331b13e99e", 0xf}, {&(0x7f0000000280)="aab2cede68f60e67fd2e961a90b503f1e46ea324e1257491c55f1bbd4447b71aa29da18eac1cb6243958748efbc1c3887355594c4dfd116ce9b7b108d2527725518b21fc2c67cfabf16088edc6e032937b78c5d7e64739e23d08420ab2e8aca18b52a85ad2239de4d75ed8665cc44c2aaee4913a88e0a2d67b98fbd527d18d9b6e3350921850774ffcf8861ba09ea8bf1de9b1d100a298dee7e8566545ce42bf843f6f7e18b639", 0xa7}, {&(0x7f0000000340)="829011decaa531b088256c9e86fa05a083a963d5a3fb6e2c26796bf27559d3730348bf6a63cddffc767fd156d0f2670b94691beb718c7ad24cfb4f5f2514b71513bc24434c565156ec1758b270a14028e4cab42b5173a25293adff694d0fa9431415b0b833755826f788e30d9f82edc2f726bcff08483a2b", 0x78}, {&(0x7f00000003c0)="f3081b59a0240bd8a3864846dc6edd32ceb9ae9b606271f33d2474a3c1f41d641acc2cde8f5e9b86e75c0b9b6f3fa56c34000bd2bf245864475a0694bb61baacd8f4bc21f097350511d892131d593c7ffa938051fa3162c0a25b1294e4", 0x5d}, {&(0x7f0000000200)="9382f10fbcd8643ebab59420edf46a9aba6c0bdf095f3ef3d63a84257712824969373b8bcf06a86c13f2", 0x2a}], 0x5, 0x0, 0x0, 0x80004}, {&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000540)="b911f67bc57c685aabf5a5e0e7f5e5123ac400fcdcaf2fdc70aa198ad5592d44a8f449571f71d1824ec8a5b9281687717366eaa440b17a140c85e9f3a161bad4c5942b2edc836aa3eba3a439cf2ed75ccba5173dcb89451c89b3ad1b02903817d29a10195fa8d3812798969b3df1fc4856d76a58ad4594ae0f2d9e5a3b42335f", 0x80}, {&(0x7f00000005c0)="818042e0a2ea1f6ab6531c03ff47f178fcae468f06be6a4da89b7b9bfd3a68d9b40d68393e7538df42df2169ba1b3caedc7cbc2b7a30b4ac0559361fcdd8c6882d24842ace67ed3010133b006ba9c0c4aab6b6e0062042ea20d269665d6c68f6251e266ab6fceb4ff9ca824b7544cdd9b89019b47e2941249767ecd49ba0af0ef13663397096f8580fbf78ee3019b5e61d4d5317d68efb88bd315f45e10bc0dfa19b856e4cc6227c192d6d37152dff5a8f25623156c1bd", 0xb7}, {&(0x7f0000000680)="629bc1eaf6f7fc830a57abc494ab5691275bc074483d8e04807fd9d0121d102c4487abcfceedd7a82e56241900337f72d282a02266032c04d1354d547493e6fa6206b45e6a948e9cfa9be505fb44f70dace47487df336bacd2b683f47dcd6a20a02cac435c0729b4e2bbe72db5f231", 0x6f}], 0x3, &(0x7f0000000ac0)=[@rights={{0x18, 0x1, 0x1, [r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r15, r17, r18}}}, @rights={{0x2c, 0x1, 0x1, [r19, r20, r8, r21, r23, r24, r25]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r8, r26, r27, r0, r3, r28, r29]}}, @cred={{0x1c, 0x1, 0x2, {r30, r31, r32}}}], 0xf0}], 0x2, 0x64840)

20:03:18 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001380)=""/65, 0x41}], 0x1, 0x5)
clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00')
exit(0x0)
preadv(r2, &(0x7f0000000500), 0x37d, 0x0)

20:03:18 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:18 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0xb, 0x0)

20:03:18 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:19 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0xc, 0x0)

20:03:19 executing program 4:
socket$packet(0x11, 0x3, 0x300)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x7, &(0x7f0000000140)=[{0x4a1, 0x1f, 0xc8, 0xffffffff}, {0x13d, 0x4, 0x69, 0x1}, {0x0, 0xe5, 0x9, 0x80000000}, {0x7, 0x2, 0x80, 0x7}, {0x1, 0x1, 0x3, 0xff08}, {0x1000, 0xe1, 0x6, 0x800}, {0x751, 0x1f, 0x0, 0x3}]}, 0x10)
write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7)

20:03:19 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x0, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:19 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:19 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0xd, 0x0)

20:03:19 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  801.168675][    C0] net_ratelimit: 20 callbacks suppressed
[  801.174376][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  801.180420][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  801.186279][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  801.192091][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  801.198093][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  801.203937][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  801.248740][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  801.254562][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  801.648722][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  801.654660][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:03:28 executing program 5:
write(0xffffffffffffffff, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r0 = socket(0x0, 0x803, 0x0)
getsockname$packet(r0, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10600)
ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f00000001c0)={0x5, "95bb7aef64c287089d5de3e417bec6fc0f12ad40300090426323a402f80fd4f7", 0x1, 0x1})
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48)
exit(0x0)
r2 = creat(&(0x7f0000000240)='./file0\x00', 0x83)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$IP_VS_SO_SET_FLUSH(r5, 0x0, 0x485, 0x0, 0x0)
ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000200)={0x0, {0x7f, 0x7}})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
dup(r6)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0x3)
r7 = dup2(r1, r6)
ioctl$PPPIOCDISCONN(r7, 0x7439)
sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="05000000000000000000010000000000000009410000000300180000001f657623193165a211fd00000000000000000000000000000000000000000000000000000000007100"/98], 0x68}}, 0x0)
sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2042000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d100ba00ec8a2bdef4b494e3066e2cf3fbe9a83af263b23253019535b881fd48454c97175f350e", @ANYRES16=r4, @ANYBLOB="00052cbd7000fddbdf2501000000000000000c41000000000014"], 0x28}, 0x1, 0x0, 0x0, 0x4050}, 0x8)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$EVIOCSABS0(r8, 0x401845c0, &(0x7f0000000180)={0x7f, 0x22f5, 0x4, 0x0, 0x4, 0x200})

20:03:28 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
pipe(&(0x7f00000000c0)={<r1=>0xffffffffffffffff})
getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f0000000200)=0x4)
r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dri/renderD128\x00', 0x3570c0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000003c0)=r3, 0x4)
ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000380)={0xc7, &(0x7f0000000280)=""/199})
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000006800030800000000a9030000020000002000000008000100575aff9fefebf9ae20ba855acbbe72f36b6744254ffe2e4173a057dcd8d2476d0479b7d4380144abbbb4bc94819c7fdd68561939066d757a3cc10ed9abb13edfc987bdd028d9a5605d1b73d76ea549e2012287087c9acc53ec20b742f7", @ANYRES32=0x0], 0x20}}, 0x0)
r4 = socket(0x10, 0x800000000080003, 0x0)
sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)

20:03:28 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0xe, 0x0)

20:03:28 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x0, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:28 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:28 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = socket$tipc(0x1e, 0x2, 0x0)
r3 = socket$inet6(0xa, 0x1, 0x0)
getsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000534000), &(0x7f0000000080)=0x4)
getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000001600))
openat$zero(0xffffffffffffff9c, &(0x7f0000000680)='/dev/zero\x00', 0x2, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, 0x0)
setfsuid(r4)
r5 = getpid()
sched_setscheduler(r5, 0x5, &(0x7f0000000380))
sendmsg$nl_generic(r1, &(0x7f0000001d00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x38000021}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001d40)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="54006a000800560026e6bf358f8f8988bb0aa0703cff8eeda0e7e14f431a001dd2f3a51c4341fa53f555222fd886cbe342f8a03c52c8e8d8e83f87fd2daccd31dac6b816182ad33455d746d37b456b944c32cff21966a02037bafc2550e29f5fc238020ffc9775b2fd4e693a0c104f59ef2e198a6dab14b28cdaba7e891772", @ANYRES32, @ANYBLOB="14003b0076626f786e6574312f766d6e657431006906cdb996a516a50891882f898127f257a5c7eac7faa399624a72c713f2fbee57dd1186c17656b277a508000f00", @ANYRES32=r4, @ANYBLOB="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"/288, @ANYRES32=r5, @ANYBLOB="446d67f6ff15447011c1317fcace6a19a50ad68a356ba970e89db99adf085c859054e229eaa7f3242717ab40cff745ef2cbb9d6c25d3200ebf797b45ac023de1ac900035000c005c0098030000000000002c631815e103eb5e979c0900a8f31f6a07c2fc062bc038906dc27f119b3925064b614f77d55ded9b328b05e6b05a20f4dd7592bc92984a0f5dce320cda0a58860d9cbfc821442f3f250aedf3e0753e80031a19e62d0c7b7ac80d9de98cd5b862fb3899644031403f96b81fd073e2ef3a9d06fde5c9a5ee935e8b83b171e1bf000000"], 0x428}, 0x1, 0x0, 0x0, 0x20800}, 0x5)
r6 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r6, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
semget$private(0x0, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000540)={0x2}, 0x4)
r7 = syz_open_dev$vbi(0x0, 0x2, 0x2)
r8 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$VIDIOC_G_EXT_CTRLS(r7, 0xc0205647, &(0x7f0000000480)={0xf000000, 0x3, 0xb7, <r9=>r7, 0x0, &(0x7f0000000400)={0xc4303adec06c51cf, 0x200, [], @string=&(0x7f00000002c0)=0x40}})
getsockopt$llc_int(r9, 0x10c, 0xf1388cbce8873513, &(0x7f0000000240), &(0x7f0000000180)=0x4)
vmsplice(0xffffffffffffffff, &(0x7f0000001640)=[{&(0x7f0000000280)="440a61f251c1c4e23486312947adcce7af5edab79d00ebb855faa5a27275e95907d782f4e6f980b4ebe9c71ca91341e584", 0x31}], 0x1, 0x0)
io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000500)={0x0, &(0x7f00000004c0)=[r0, r6, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x5)
setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10)
pipe(&(0x7f0000000080)={<r10=>0xffffffffffffffff})
close(0xffffffffffffffff)
r11 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2)
ioctl$NBD_SET_BLKSIZE(r11, 0xab01, 0x0)
splice(r10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@dev, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8)
r12 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
r13 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0)
pwritev(r13, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003)
getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4)
ioctl$LOOP_CHANGE_FD(r12, 0x4c00, r13)
sendfile(r6, r12, 0x0, 0x102000002)

20:03:28 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0xf, 0x0)

20:03:28 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:28 executing program 4:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read'}}]}})

20:03:28 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x0, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:28 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x10, 0x0)

20:03:28 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e", 0x14a}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  806.999185][T13040] syz-executor.0 (13040) used greatest stack depth: 22008 bytes left
[  807.408695][    C0] net_ratelimit: 20 callbacks suppressed
[  807.414792][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  807.420837][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  807.426630][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  807.432377][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  807.438161][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  807.444125][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  807.488722][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  807.494591][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  807.888686][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  807.894516][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  813.648695][    C0] net_ratelimit: 20 callbacks suppressed
[  813.648701][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  813.660232][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  813.666128][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  813.671978][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  813.677808][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  813.683620][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  813.728694][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  813.734649][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  814.128620][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  814.134472][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:03:37 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x2, 0x73)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2)
ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000140)={0xf0f041})
r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10)
sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428)
openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0), 0x0)

20:03:37 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x11, 0x0)

20:03:37 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$kcm(0xa, 0x5, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:37 executing program 4:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f00000003c0)=0x40000)
syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x8201, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x8)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mkdir(&(0x7f00000002c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0)
syz_open_dev$mice(0x0, 0x0, 0x8400)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000))
ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000001580)={0x53d2b708009d0c60, &(0x7f0000001540), 0x1, 0xffffffffffffffff, 0xe2c1a59609f47730})
r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
r2 = dup(r1)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x2, 0x1006, 0x2000, &(0x7f0000ffb000/0x2000)=nil})
r3 = openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00001ae000/0x3000)=nil, 0x3000, 0x2, 0x16f, 0x100020)
write$cgroup_pid(r3, &(0x7f0000000300), 0x12)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0)
preadv(r4, &(0x7f0000000380)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, 0x0)
syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000000, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, <r5=>0x0}, &(0x7f00000001c0)=0xc)
semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r5, 0xffffffffffffffff}})
syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0)
lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300))
r6 = socket(0xa, 0x3, 0x8)
ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4})
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x0, 0xb}}, 0xf)
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r8=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r8)
r9 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r10=>0xffffffffffffffff})
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r11=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r11, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r12=>0xffffffffffffffff})
getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r13 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$key(r13, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001680)=ANY=[@ANYRES64, @ANYPTR64, @ANYPTR=&(0x7f0000002400)=ANY=[@ANYBLOB="de39eec890ef74c178346fc9d55a91f2f920319f375ec6328a3f9b36a89adf209fb73e5bcc8257d934ad4cd4cd8bf79f4242cfb4c66202", @ANYBLOB="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"]], 0xfffffffffffffe81}}, 0x0)
r14 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x1e1840, 0x0)
ioctl$TIOCSSERIAL(r14, 0x541e, &(0x7f0000000240)={0x4, 0x0, 0x2e8, 0x7, 0x0, 0x0, 0x0, 0x1c200, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

20:03:37 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:37 executing program 0:
socket$netlink(0x10, 0x3, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500000000"], 0x1}}, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000280)={0x2, 0x1000})
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xe)
socket$nl_route(0x10, 0x3, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/19)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0)
ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc, 0xb706})
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000003c0)={0x60000, 0x2, 0x2, <r2=>0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x980903, 0x7ff, [], @p_u8=&(0x7f0000000340)=0x5}})
sendmsg$nl_route(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv4_newrule={0x24, 0x20, 0x100, 0x70bd28, 0x25dfdbff, {0x2, 0x0, 0xa0, 0x80, 0x3f, 0x0, 0x0, 0x7, 0x12}, [@FRA_DST={0x8, 0x1, @rand_addr=0xfffffffc}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x2400c8c0)
ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x0, 0x6ff3e968})
epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x1ff, &(0x7f0000000300)={0xed}, 0x8)

20:03:37 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$kcm(0xa, 0x5, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:03:37 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x12, 0x0)

20:03:38 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$kcm(0xa, 0x5, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  815.920384][T13100] mmap: syz-executor.4 (13100) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst.
20:03:38 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x13, 0x0)

20:03:38 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, 0x0, 0x60)

20:03:38 executing program 0:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080))
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x3, 0x70, 0xa8, 0xf4, 0x7f, 0xfc, 0x0, 0xfffffffffffffffd, 0x93180e5717df8002, 0x152ba3848411bac5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x73dffa17cfefd533, @perf_config_ext={0x400, 0x8001}, 0x8, 0xfff, 0xcaf, 0x5, 0x2, 0x3, 0x7ff})
r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
connect$bt_l2cap(r2, &(0x7f0000000000), 0xe)
r3 = accept$ax25(r1, &(0x7f0000000140)={{}, [@default, @default, @bcast, @null, @remote, @null, @remote, @netrom]}, &(0x7f00000001c0)=0x48)
ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000200)={0x7f, 0xc, 0x4, 0x5001000, 0x3, {}, {0x0, 0xcf1b836b9e7ab9c7, 0x4, 0x1, 0x3, 0x20, "1c663247"}, 0x4, 0x3, @userptr=0x1, 0x2, 0x0, r3})
dup3(r0, r2, 0x0)

[  816.045158][T13100] bridge0: port 3(gretap0) entered blocking state
[  816.086777][T13100] bridge0: port 3(gretap0) entered disabled state
[  816.152477][T13100] device gretap0 entered promiscuous mode
[  819.888670][    C0] net_ratelimit: 20 callbacks suppressed
[  819.888679][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  819.900299][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  819.906138][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  819.911916][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  819.917770][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  819.923615][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  819.968743][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  819.974777][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  820.368698][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  820.374610][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  826.128624][    C0] net_ratelimit: 20 callbacks suppressed
[  826.128629][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  826.140228][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  826.146055][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  826.151870][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  826.157673][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  826.163442][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  826.208678][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  826.215217][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  826.608641][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  826.614535][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:03:49 executing program 5:
r0 = socket$inet6(0xa, 0x80003, 0xff)
ioctl(r0, 0x6, &(0x7f0000000080)="0800b5055e0bcfe87b2071")
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', <r2=>0x0})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="7c0000002400070f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x7c}}, 0x0)
r3 = socket(0x4000000000010, 0x1000000000080002, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000))
sendmmsg$alg(r3, &(0x7f0000000140), 0x42, 0x0)

20:03:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x14, 0x0)

20:03:49 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, 0x0, 0x60)

20:03:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
sigaltstack(&(0x7f0000338000/0x3000)=nil, 0x0)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(r1, 0x5441, 0x10000)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf)
process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0x5df211b9}], 0x23a, 0x0)

20:03:49 executing program 0:
syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0)
r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ion\x00', 0x0, 0x0)
r1 = syz_open_dev$dri(0x0, 0x0, 0x0)
r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, <r3=>0xffffffffffffffff})
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = dup(r3)
perf_event_open(&(0x7f000001d000)={0x1, 0x335, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x2)
connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
shutdown(0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0)
r7 = socket$nl_generic(0x10, 0x3, 0x10)
r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r8, 0x101, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0x200, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}})
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={<r9=>0x0, 0x0, r6})
ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0xfff3ffb3, &(0x7f0000000100)={r9, 0x7000000})
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000080))
ioctl$TIOCNOTTY(r10, 0x5422)
dup3(r0, r1, 0x0)

20:03:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x15, 0x0)

20:03:49 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, 0x0, 0x60)

20:03:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x16, 0x0)

20:03:49 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x60)

20:03:49 executing program 0:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r2, 0x0)
sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="c4000000190001000000000000000000ff010000000000000000000000000001e000000180000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="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"], 0x4}}, 0x0)

20:03:49 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x17, 0x0)

[  832.368653][    C0] net_ratelimit: 20 callbacks suppressed
[  832.375056][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  832.380901][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  832.386768][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  832.392552][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  832.398452][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  832.404223][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  832.448769][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  832.454739][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  832.848676][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  832.854545][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:03:58 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800004000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x808480, 0x0)
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000240)=""/48, &(0x7f0000000280)=0x30)
r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0)
fchdir(r1)
mkdir(&(0x7f0000000000)='./file0\x00', 0x10)

20:03:58 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x60)

20:03:58 executing program 0:
ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0)
lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='user.syz\x00')
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e20, 0x3, @empty, 0xffffff03}, @in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, @in={0x2, 0x4a21, @local}], 0x68)
r2 = socket(0x2000000000000021, 0x2, 0x10000000000002)
sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "ec"}], 0x18}, 0xf00}], 0x1, 0x0)
connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f4e230000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4)

20:03:58 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x18, 0x0)

20:03:58 executing program 4:
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10010, r0, 0x100000000)
r1 = socket$l2tp(0x18, 0x1, 0x1)
ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000100)={'dummy0\x00'})

20:03:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:03:58 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x19, 0x0)

20:03:58 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x60)

20:03:58 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x18, 0x0)

20:03:58 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'})
r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x809c0, 0x0)
ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000180)={0x74, 0x0, [0x10001, 0x80000001, 0x0, 0xffffffffffffffff]})
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
r4 = socket(0x1, 0xa, 0xfd)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
accept$inet(r4, &(0x7f0000000200)={0x2, 0x0, @initdev}, &(0x7f0000000240)=0x10)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600)
ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0)
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
dup(r0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = dup(r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000480)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb], 0x100000})
ioctl$KVM_RUN(r3, 0xae80, 0x0)

20:03:58 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x1a, 0x0)

20:03:58 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

[  836.807667][T13209] kvm: pic: non byte read
[  836.820446][T13209] kvm: pic: non byte read
[  836.832193][T13209] kvm: pic: non byte write
[  836.845206][T13209] kvm: pic: non byte read
[  836.878038][T13209] kvm: pic: non byte write
[  836.895656][T13209] kvm: pic: non byte read
[  836.919607][T13209] kvm: pic: non byte write
[  836.925016][T13209] kvm: pic: single mode not supported
[  836.925224][T13209] kvm: pic: non byte read
[  836.937109][T13209] kvm: pic: non byte write
[  838.618652][    C0] net_ratelimit: 20 callbacks suppressed
[  838.618659][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  838.630543][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  838.636365][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  838.642299][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  838.648662][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  838.654468][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  838.698715][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  838.704550][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  839.088681][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  839.088733][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  844.848654][    C0] net_ratelimit: 20 callbacks suppressed
[  844.848662][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  844.860377][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  844.867218][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  844.873531][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  844.879856][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  844.885831][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  844.938707][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  844.944580][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  845.328611][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  845.334584][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:09 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x89}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x19c, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
rmdir(0x0)
perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x4)
socket$inet_udp(0x2, 0x2, 0x0)
execve(&(0x7f0000000640)='./file0/file0\x00', &(0x7f0000000400)=[&(0x7f0000000180)='em0\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00'], &(0x7f00000005c0)=[&(0x7f0000000440)='user[\x00', &(0x7f0000000480)='user\x00', &(0x7f0000000500)='user]\x00', &(0x7f0000000580)='\x00'])
mkdir(0x0, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10)
r2 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98)
io_setup(0x8, &(0x7f00000004c0)=<r3=>0x0)
io_submit(r3, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}])
ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000100)={0x0, 0x0, [0x0, 0xaa4]})
rt_tgsigqueueinfo(0x0, 0x0, 0x38, &(0x7f0000000680)={0x2c, 0x7})

20:04:09 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x18, 0x0)

20:04:09 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:04:09 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x2)

20:04:09 executing program 0:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r3 = socket(0x5, 0x800, 0xfc)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
r4 = socket(0x10, 0x2, 0x0)
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8983, &(0x7f0000000000)={0x8, 'syzkaller0\x00', {'bond0\x00'}, 0x3})
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r6=>0x0}, &(0x7f0000cab000)=0xc)
setresgid(0x0, 0x0, r6)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f0000000000)=ANY=[], @ANYRES32=0x0, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="728c07ffae4f87b56886e362a5522461b32b959afa7ed430f129899358c2290a464977033b5ef7ad8b9869175473bcfb89198c9d893cef2f2d4e3c1017022501375a4ca28ac4f8a9aa35958a6eaf84aebbc0f493b7fbe0774890dc666a69f6c8c6dd6dcdcde8367edfdf0a06cce76c96956d527207dc9d2fe6bcccbe81aa2739aa35f3167f646f4ff152720399df9a6e039de4dd58006da25bb8e318ef5560ab2390232e8c51fb65d60f", @ANYRESDEC=r6, @ANYPTR64, @ANYPTR, @ANYPTR64, @ANYRES64=r2, @ANYBLOB="3747b77e12cc200069de99038ee042966954c7ad7783cbb3149b49171f395717079efcb96834387703e88e319d3c96707080127ac15d", @ANYRES32=r1, @ANYBLOB="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", @ANYPTR64], @ANYBLOB="d6ce52c573dbc9fd7c90238e5880f6ecc482cb9e1a6d9aed6f18327f41796186fa8ddab2c5d691fbb1258befb28973cc8624c09bed2de6e5862f252ae64e1662770544144d3ded7dc2286d48cae8913c7a0633a90fb0dd3ac781d3ffb37e6a787f3330f15715c6cfbf7bae87091db8eccc4cede88f3a6d63e750e706f750d353f0c5acec9c2ac7293a7c477edbf26ebc3521b32e2db02e46a3c62f9812a5e4add3535f56bc0e06cb8a52dc58d4021dad5d915493ab99e2fe36b18c5ca84af700b95c6014ee7eb1c6eddda2111046debcaf89485ae462a6ee3bc5f5473c8a080f79f0f55e50741c4ff03fc850", @ANYPTR64], @ANYRES16=r3], 0x4)

20:04:09 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:04:09 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60)

20:04:09 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x18, 0x0)

20:04:10 executing program 0:
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fe, 0x0, 0x0, 0x4d}, 0x10)
sendmmsg(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x3}, 0x80, 0x0}}], 0x2, 0x0)

20:04:10 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, 0x0}, 0x60)

20:04:10 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
socket$inet(0x2, 0x3, 0x29)
socket$l2tp(0x18, 0x1, 0x1)
syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000480000000000e1ff95000000000000002ba7e1d30cb599e83f24a3aa81d36b26fbfebc41056bd8174b7960317142fa9ea41d8123741c4e345c652fbc1626cca2a21a69774e50ae0209e62f51ee988e6e06c8206ac69306c404000000c788b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341965c39e9ef8f6e3968f200e011ea665c45a3449abe802f5ab3e09cf6c662ed4148d3b3e22278d00031e5388ee5c867de2c6211d6ececb0cd2b6d357b8580218ce740068720000074e468ee23fd2f73902ebcfcf49822775985bf31b405b433a8acd715f5888b2007f00000000000000000100719e00000000000006a10f58fa64533500000000000000000000000031000000000000000000e75a89faff01210cce39bf405f1e846c12423a164a33e6fdeb6f26dc7add60b318778f90047f6d5bc24fef5d7d617de7a6520655a80d608df4d433623c850af895abba14f6fbd7fbad2a431ab9142f3a06d54740a46792cbf4609646b6c5c29647d2f90000000000000000000000000000000000000000000100e659599ab9522ab5b972cdec742841042266cd8c84f3af90de4d9c8b842141bad887e1f3e16a24796599c30cf72686d9b16696851a343c087085896c7faddf259e520bedc3043c5cf3a5e6c0a7f459ee90d6e526a05ed2ccf2359aaf5d38d3c178ed50fdbed374dba1ae4a2f51f4438c91dcc3e43a37facdb9"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x2, 0xe80, 0x0, &(0x7f0000001140)="afa55ea5081d1dc7610da2290f9e", 0x0, 0x737, 0x0, 0x0, 0xb1, 0x0, &(0x7f00000003c0)="14be1519cbadc73050e32edbd47efd676987a6716a741a33c8957714fbfe696a8930600438ca34510bd90bbd6f787f487b52d80fc15b8d41cb077ea172fbcbcd66c1278422573df982a20a9d92c21c7baeba610f9434380cbb5703e5397d6efd14fd2dfcbae47a1f2cc5cf639af66b732c89bfe97beac2d371530a12a22bc9248afd660de0e1cb6c00eeb4b58ba317790404feba733321930c9547340100ac5735542b3f99ba8a43539694db2535358281"}, 0x40)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0)
write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0)

20:04:10 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x4)

[  851.088682][    C0] net_ratelimit: 20 callbacks suppressed
[  851.094569][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  851.100580][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  851.107524][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  851.113717][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  851.119729][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  851.125544][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  851.168753][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  851.176381][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  851.568667][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  851.574820][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:19 executing program 5:
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0)
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000740)={0x0, 0x0, 0x3, 0x0, [], [{0x2677, 0x3f, 0x0, 0x8, 0x0, 0x5}, {0xfffffffb, 0x10000, 0x8, 0xf5cb, 0x56b7, 0x8001}], [[], [], []]})
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)
r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00')
preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000)

20:04:19 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, 0x0}, 0x60)

20:04:19 executing program 0:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r1, &(0x7f0000000580), 0x10000005c)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
getpid()
write$P9_RLCREATE(r1, 0x0, 0x0)
connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @local}, 0x10)
pipe(0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18)
sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0)

20:04:19 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x2, 0xe80, 0x0, &(0x7f0000001140)="afa55ea5081d1dc7610da2290f9e", 0x0, 0x737, 0x0, 0x0, 0xb1, 0x0, &(0x7f00000003c0)="14be1519cbadc73050e32edbd47efd676987a6716a741a33c8957714fbfe696a8930600438ca34510bd90bbd6f787f487b52d80fc15b8d41cb077ea172fbcbcd66c1278422573df982a20a9d92c21c7baeba610f9434380cbb5703e5397d6efd14fd2dfcbae47a1f2cc5cf639af66b732c89bfe97beac2d371530a12a22bc9248afd660de0e1cb6c00eeb4b58ba317790404feba733321930c9547340100ac5735542b3f99ba8a43539694db2535358281"}, 0x40)

20:04:19 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x7)

20:04:19 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:04:19 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, 0x0}, 0x60)

20:04:19 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x2, 0xe80, 0x0, &(0x7f0000001140)="afa55ea5081d1dc7610da2290f9e", 0x0, 0x737, 0x0, 0x0, 0xb1, 0x0, &(0x7f00000003c0)="14be1519cbadc73050e32edbd47efd676987a6716a741a33c8957714fbfe696a8930600438ca34510bd90bbd6f787f487b52d80fc15b8d41cb077ea172fbcbcd66c1278422573df982a20a9d92c21c7baeba610f9434380cbb5703e5397d6efd14fd2dfcbae47a1f2cc5cf639af66b732c89bfe97beac2d371530a12a22bc9248afd660de0e1cb6c00eeb4b58ba317790404feba733321930c9547340100ac5735542b3f99ba8a43539694db2535358281"}, 0x40)

20:04:19 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)}, 0x60)

20:04:19 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x8)

20:04:19 executing program 4:
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300))
pipe(&(0x7f0000001280))
socket$vsock_stream(0x28, 0x1, 0x0)
connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000), 0x10)
socket$inet6(0xa, 0x6, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
perf_event_open(&(0x7f0000000180)={0x4, 0xff78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

[  857.328598][    C0] net_ratelimit: 20 callbacks suppressed
[  857.328607][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  857.340616][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  857.346669][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  857.352519][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  857.358576][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  857.364887][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  857.408658][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  857.414522][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:19 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)}, 0x60)

[  857.818615][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  857.824679][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  863.568643][    C0] net_ratelimit: 20 callbacks suppressed
[  863.568650][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  863.581348][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  863.587169][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  863.593076][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  863.598955][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  863.604723][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  863.658742][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  863.664892][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  864.048673][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  864.054979][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:30 executing program 5:
keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f0000001c40)="9564a3dd6bc12200b120d6b0be", 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x40)

20:04:30 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x9)

20:04:30 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)}, 0x60)

20:04:30 executing program 4:
r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0)
r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ion\x00', 0x0, 0x0)
r2 = syz_open_dev$dri(0x0, 0x0, 0x0)
r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, <r4=>0xffffffffffffffff})
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x2042, 0xa)
getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={<r7=>0x0, 0xffffffff}, &(0x7f0000000240)=0x8)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000280)={r7, 0xeb, "0c92394775817dfcf7ea4a85f51f74bf2425cc4415bd4f2add426801316538d8a249d2570c1773930fa633f6dbe51f66c3d7340d143d4d0c4f20145713acc1562371b47b6883a255f980e33c67d9ee2b758bb4c30114686c2d74b972f0442b60b1dbf7d27188307ae0318292d3be23c1b67743d4e14a294b7729bf2950e594525ceea8bc64c9d574dbdc18094068529b1df829c0b0439f2a4a32a65ba6bd1fa97c3751aa73f5c0aba8d06226ac9e653c413d187212e96d2eb0c9224ea5e172e0f596ad5f029cd222f0be395ad6ed2d2a426b0c7d0ebf0d7656bcd457d5e5b4bc54140762f89678da56f972"}, &(0x7f0000000380)=0xf3)
r8 = dup2(r5, r5)
r9 = semget$private(0x0, 0x8, 0x10)
semtimedop(r9, &(0x7f0000000000)=[{}], 0x1, 0x0)
semop(r9, &(0x7f00000001c0), 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x7ffffffc)
r10 = dup(r4)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={<r11=>0x0, 0x0, r10})
ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0xfff3ffb3, &(0x7f0000000100)={r11, 0x7000000})
openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0)
dup3(r1, r2, 0x0)
r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r12, 0x40086602, &(0x7f0000000080))
openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x2aa500, 0x0)
ioctl$DRM_IOCTL_GET_MAGIC(r12, 0x80046402, &(0x7f0000000080)=0x4)
r13 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
ioctl$FS_IOC_GETFSMAP(r13, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x9, 0x0, [], [{0x6, 0xffffff1a, 0x4, 0x9, 0xf48, 0x5}, {0x3, 0x2, 0x4e, 0x8000, 0xff, 0x1}], [[], [], [], [], [], [], [], [], []]})
write(r0, &(0x7f0000000180)="8703f1911cae610923daf6f21fa7678ca8532b8df1292550455b30ff0e8f019080ac056af105f917b7a549700f33f1", 0x2f)

20:04:30 executing program 0:
r0 = socket$inet6(0x10, 0x100000000000003, 0x0)
r1 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r1, 0x4, 0xffffffffffffffff, 0x8)
r2 = syz_open_procfs(r1, &(0x7f0000000000)='\xab\xd3\x18%@#\xb7\x14')
write$P9_RSTAT(r2, &(0x7f0000000080)={0x7f, 0x7d, 0x1, {0x0, 0x78, 0x8, 0xa4, {0x0, 0x1, 0x6}, 0x2000000, 0x5, 0x8, 0x0, 0x10, 'keyringproceth1@', 0x14, 'mime_typeeth0%vmnet1', 0x17, '%@(posix_acl_access@%-$', 0xa, ']mime_type'}}, 0x7f)
sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c025244d2500080008000a00492c2095d13936af28f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0xb8}], 0x1}, 0x0)

20:04:30 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:04:30 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0x60)

[  868.504208][T13335] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'.
20:04:30 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
io_setup(0x83, &(0x7f00000003c0)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x3000}])
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600)
r4 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000400)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x840020, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno'}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'vfat\x00'}}, {@posixacl='posixacl'}], [{@pcr={'pcr', 0x3d, 0x9}}, {@subj_user={'subj_user', 0x3d, 'eth1&-Vvmnet1\xca[(\xd8^^#systemtrustednodev\'\'trusted'}}, {@subj_user={'subj_user', 0x3d, '-#/\'${^'}}, {@seclabel='seclabel'}, {@euid_gt={'euid>', r5}}, {@context={'context', 0x3d, 'root'}}]}})

20:04:30 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0xa)

20:04:30 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x11, 0x80a, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', <r2=>0x0})
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0)
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
sendmsg$nl_route(r5, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@mpls_delroute={0x148, 0x19, 0x10, 0x70bd28, 0x25dfdbfc, {0x1c, 0x402ec653e4619f90, 0x14, 0x4, 0xff, 0x2, 0x3e0ac262643e94da, 0x9, 0x7943c0433c4c5113}, [@RTA_DST={0x8, 0x1, {0xd8, 0x0, 0x1}}, @RTA_VIA={0x14, 0x12, {0x10, "0a870410db7b53ebb7204df0c923"}}, @RTA_NEWDST={0x84, 0x13, [{0x8, 0x0, 0x1}, {0x4}, {0x7fff}, {0x9}, {0x5}, {0x8}, {0x2}, {0x200, 0x0, 0x1}, {0x8, 0x0, 0x1}, {0x1f, 0x0, 0x1}, {0x1000, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0x80}, {0x9, 0x0, 0x1}, {0x20, 0x0, 0x1}, {0x4}, {0x7ff, 0x0, 0x1}, {0x2d}, {0x1f}, {0xc0, 0x0, 0x1}, {0x100}, {0x9}, {0xa7cb, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x1000}, {0x1, 0x0, 0x1}, {0x6}, {0x8000}, {0x101}, {0x100}, {0x81}, {0x5}]}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0xff}, @RTA_NEWDST={0x84, 0x13, [{0x0, 0x0, 0x1}, {0x7}, {0x2000}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x3, 0x0, 0x1}, {0x8000, 0x0, 0x1}, {0x7}, {0x3, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0x10000, 0x0, 0x1}, {0x1}, {0x4a}, {0x8, 0x0, 0x1}, {0x40, 0x0, 0x1}, {0xfe, 0x0, 0x1}, {0x416}, {0x7}, {0x9}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x200}, {0x6, 0x0, 0x1}, {0x6}, {0x40}, {0x5}, {0x7}, {0x2}, {0x7ff}, {0x7f, 0x0, 0x1}, {0x1ff, 0x0, 0x1}, {0x6}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000)

20:04:30 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0x60)

[  868.744690][T13352] bond0: cannot enslave bond to itself.
[  868.813825][T13350] attempt to access beyond end of device
[  868.820002][T13350] loop4: rw=2049, want=78, limit=63
[  868.827003][T13350] Buffer I/O error on dev loop4, logical block 77, lost async page write
[  868.844949][T13350] attempt to access beyond end of device
20:04:31 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{0x0}], 0x1}, 0x60)

[  868.859660][T13361] bond0: cannot enslave bond to itself.
[  868.878576][T13350] loop4: rw=2049, want=79, limit=63
[  868.883853][T13350] Buffer I/O error on dev loop4, logical block 78, lost async page write
[  868.897237][T13350] attempt to access beyond end of device
[  868.905667][T13350] loop4: rw=2049, want=80, limit=63
[  868.916034][T13350] Buffer I/O error on dev loop4, logical block 79, lost async page write
[  868.994026][T13350] attempt to access beyond end of device
[  869.012486][T13350] loop4: rw=2049, want=81, limit=63
[  869.024399][T13350] Buffer I/O error on dev loop4, logical block 80, lost async page write
[  869.038113][T13350] attempt to access beyond end of device
[  869.045432][T13350] loop4: rw=2049, want=130, limit=63
[  869.057873][T13350] Buffer I/O error on dev loop4, logical block 129, lost async page write
[  869.072977][T13350] attempt to access beyond end of device
[  869.078813][T13350] loop4: rw=2049, want=131, limit=63
[  869.084141][T13350] Buffer I/O error on dev loop4, logical block 130, lost async page write
[  869.097055][T13350] attempt to access beyond end of device
[  869.102845][T13350] loop4: rw=2049, want=132, limit=63
[  869.108731][T13350] Buffer I/O error on dev loop4, logical block 131, lost async page write
[  869.117531][T13350] attempt to access beyond end of device
[  869.123484][T13350] loop4: rw=2049, want=133, limit=63
[  869.129760][T13350] Buffer I/O error on dev loop4, logical block 132, lost async page write
[  869.138310][T13350] attempt to access beyond end of device
[  869.144052][T13350] loop4: rw=2049, want=142, limit=63
[  869.149534][T13350] Buffer I/O error on dev loop4, logical block 141, lost async page write
[  869.158072][T13350] attempt to access beyond end of device
[  869.164541][T13350] loop4: rw=2049, want=143, limit=63
[  869.169955][T13350] Buffer I/O error on dev loop4, logical block 142, lost async page write
[  869.178680][T13350] attempt to access beyond end of device
[  869.184351][T13350] loop4: rw=2049, want=144, limit=63
[  869.189939][T13350] attempt to access beyond end of device
[  869.195581][T13350] loop4: rw=2049, want=145, limit=63
[  869.201554][T13350] attempt to access beyond end of device
[  869.207202][T13350] loop4: rw=2049, want=153, limit=63
[  869.808619][    C0] net_ratelimit: 20 callbacks suppressed
[  869.814318][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  869.820120][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  869.825981][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  869.831980][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  869.837927][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  869.843745][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  869.891466][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  869.897490][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  870.288655][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  870.294697][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  876.048667][    C0] net_ratelimit: 20 callbacks suppressed
[  876.048675][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  876.060614][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  876.066597][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  876.072489][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  876.078728][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  876.084548][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  876.128706][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  876.134565][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  876.528627][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  876.534507][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:41 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0x60)

20:04:41 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0xb)

20:04:41 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$kcm(0x2, 0x3, 0x2)
ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local})
fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='/dev/vhci\x00', 0x0, r1)
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246)
write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYRESHEX=r1], 0x12)
r3 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x88000001}, 0xc)

20:04:41 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000159000)={0x1, &(0x7f0000a7dff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000000)=0xf02d)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98)

20:04:41 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:04:41 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r3, &(0x7f0000000540)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r6=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r6, 0x0)
r7 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r9=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r9, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, <r10=>0xffffffffffffffff})
getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r11=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r11, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r4, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES64=0x0, @ANYRES16], @ANYRES32=r2, @ANYRESOCT, @ANYRES64, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYPTR64, @ANYRESDEC=r6, @ANYRESDEC=r2, @ANYRES32=r7, @ANYBLOB="84adfe82728449cfebf2b6f3887a7ac8d505c2052ce654c1d02606c30f54ae63caa906c3daaf3dd5c15d268c2bb1b3b79747ff3dbd3d202ab95f5fbac6de9a939228eca11861947bf82831cb14d3fa587e6ca8c4081dea134341327b9ae1578a469fe7f6d736299c431107ef08648e1792a8d15051a0dfe5ea927a5962989d", @ANYPTR64], @ANYRES32=r9, @ANYRESHEX=r11, @ANYBLOB="6e57913fdca260648cee7ff645a4205b56e3d00c82dc8eb6c6fe48d1ec5b98050b3b7809dc14d8e42e0b2e0ac94c1b7eb2e8671e92ba38471547c4dba1d4323feb9aff719808757c3d3b9a2df1b50b485af75336bf414e7b2abb606ee589286f5d59bb7a3b7e2a74e5c75d783b1cc2fecb5ea92fff7e8d641605d1f4d82ef248019bc6efb29a4c24cb3d623ab78fec0000000000", @ANYRESDEC, @ANYRES64]], 0x3}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002a001f7e0b6490881b24f20000000000", @ANYRES32=r4, @ANYBLOB="009e925b8b250000000800000000000000"], 0x24}}, 0x20000086)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@mpls_delroute={0x34, 0x19, 0x800, 0x70bd27, 0x25dfdbfe, {0x1c, 0x0, 0x10, 0x7, 0x0, 0x6, 0xfe, 0x1, 0x1800}, [@RTA_DST={0x8, 0x1, {0x0, 0x0, 0x1}}, @RTA_OIF={0x8, 0x4, r4}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5b}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000810}, 0x1)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300250069000007a2e407edab1d05580a000000460b8107a277001419000400d0000020000003f50000003e0000ef38bf461e59d7", 0x330}], 0x1)
r12 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x181301, 0x0)
ioctl$EVIOCRMFF(r12, 0x40044581, &(0x7f0000000340)=0x4)

20:04:41 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0x60)

20:04:42 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x40)
ioctl$BLKPG(r0, 0x1269, &(0x7f0000000200)={0x4, 0x200, 0xd7, &(0x7f00000000c0)="5ffc82d6127b0cab64892979b77c8d0beaad39e395491741ccdd8f9c0897bd24bd6e7f8d1b65e9130069c82c45a234df27521c871f9589d14f08fa26072302040165742dcc3190f8e91ecb4387a132bc171cab385665cb075a7be8bf884ba5e3a16e312c5397cd2d3cf1dd8422432dfda295a8c2a908ba476133d51b7ce19389c2a7a6b653cf5c5d9be66c4b8e7eff151bb8ea919fddbb7bb990d028459bc5b92c6f45db831b4fea1f2aa92fa53c923b5fd32c2af7140f819fd55a1a5138a68dd4df5c502436da51b83d42533168deec096a4f36c2cd49"})
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffcc, 0x0, 0x0, 0x663abba741622feb)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="6635000010000f22e0d70f224d17bad1040f9c930000ef260f01dfbac160b00fee0fec4600673e64660f383db31a0b0000360f01ca", 0xffffff91}], 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x23d, 0x0, 0x0, 0x0)

20:04:42 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0xe)

20:04:42 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0xb)

20:04:42 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x11)

20:04:42 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0xb)

20:04:42 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x19)

20:04:42 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0xb)

20:04:43 executing program 0:
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0)
ioctl$SNDCTL_DSP_SPEED(r0, 0x40045010, &(0x7f0000000040))
read$FUSE(r0, &(0x7f00000000c0), 0x1000)
fspick(0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', 0x1)
write$FUSE_LK(0xffffffffffffffff, &(0x7f0000001100)={0x28, 0x0, 0x6, {{0xa4, 0x6, 0x2}}}, 0x28)

20:04:43 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x1c)

[  882.298627][    C0] net_ratelimit: 20 callbacks suppressed
[  882.298634][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  882.310448][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  882.316532][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  882.323212][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  882.329869][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  882.335619][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  882.368702][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  882.374701][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:44 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  882.768663][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  882.774528][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  888.528672][    C0] net_ratelimit: 20 callbacks suppressed
[  888.528678][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  888.540668][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  888.546688][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  888.552714][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  888.559137][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  888.565622][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  888.608759][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  888.614644][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  889.008666][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  889.014632][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:04:55 executing program 5:
r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0)
socket$alg(0x26, 0x5, 0x0)
ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x6, 0x0)
openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0)
ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300))
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000001c0)={0x4, 0x6})
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r3=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1100000000000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0)

20:04:55 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

20:04:55 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x20000002)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000380)={0x10003, 0x1a778a0dd536a5, 0xf000, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x981, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0xdfd]})
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0)
write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8)
ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000440)={0xfff, 0xa, 0x4, 0x20000000, 0x0, {0x0, 0xc}, {}, 0x2})
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r1, r2)
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)="8907", 0x2)
connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x62)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080))
ioctl$KVM_RUN(r3, 0xae80, 0x0)
setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000), 0xfea3)
getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000002180)=ANY=[@ANYBLOB], &(0x7f0000000f80)=0x1)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00')
ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0)
ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000100)=0x0)
ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0)
r4 = socket(0x80000000000000a, 0x2, 0x0)
setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x80, 0x0, @mcast1={0xff, 0x7}, 0x1329c03}}, {{0xa, 0x4e20, 0x0, @mcast1}}}, 0x108)
socket(0x80000000000000a, 0x2, 0x0)
ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x2)

20:04:55 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)}], 0x1}, 0x60)

20:04:55 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x30)

20:04:55 executing program 0:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
r0 = creat(&(0x7f0000000040)='./bus/file1\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:etc_aliases_t:s0\x00', 0x23, 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=.Jfile0'])
sched_setscheduler(0x0, 0x0, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
pipe(0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0)
socket(0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, 0x0)
waitid(0x0, 0x0, 0x0, 0x2, &(0x7f0000000480))
memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r1 = gettid()
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000300)={0x2, 0x1})
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
syz_open_dev$sg(0x0, 0x0, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780))
ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0)
syz_open_dev$dmmidi(0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30)
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$tipc(0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140)='./bus/file1\x00')

20:04:55 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0)

20:04:55 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x60)

[  893.461202][T13450] overlayfs: failed to resolve '.Jfile0': -2
20:04:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x81}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000200)=""/190)
open(0x0, 0x0, 0x0)
syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0)

[  893.626420][T13450] overlayfs: failed to resolve '.Jfile0': -2
20:04:55 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x65)

20:04:55 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x60)

[  893.767311][T13476] BTRFS error (device loop0): superblock checksum mismatch
[  893.809213][T13476] BTRFS error (device loop0): open_ctree failed
20:04:56 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x1f4)

[  894.768623][    C0] net_ratelimit: 20 callbacks suppressed
[  894.768631][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  894.781087][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  894.786921][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  894.792738][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  894.799102][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  894.805064][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  894.848716][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  894.854676][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  895.248643][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  895.254711][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  901.008641][    C0] net_ratelimit: 20 callbacks suppressed
[  901.008648][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  901.020269][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  901.026090][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  901.031880][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  901.037660][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  901.043415][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  901.088738][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  901.094710][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  901.488641][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  901.494736][    C0] protocol 88fb is buggy, dev hsr_slave_1
20:05:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept$alg(r0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7be8b1fbab843c84e2306a8188fc30000cf00ba17c05d457952878e43711f97f2", 0x30}], 0x1}], 0x1, 0x0)
recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000080)=""/49, 0x31}], 0x2}, 0x0)

20:05:06 executing program 0:
r0 = fcntl$getown(0xffffffffffffffff, 0x9)
perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4}, r0, 0x4, 0xffffffffffffffff, 0x8)
sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x3ff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@fat=@errors_continue='errors=continue'}]})

20:05:06 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x60)

20:05:06 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x3e8)

20:05:06 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0)

20:05:06 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r1, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_open_dev$tty1(0xc, 0x4, 0x1)
sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  904.792190][T13510] ==================================================================
[  904.800738][T13510] BUG: KASAN: use-after-free in __xfrm_decode_session+0x1cfb/0x2e90
[  904.808823][T13510] Read of size 1 at addr ffff88809166e75e by task syz-executor.3/13510
[  904.817064][T13510] 
[  904.819424][T13510] CPU: 1 PID: 13510 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0
[  904.829924][T13510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  904.841024][T13510] Call Trace:
[  904.844310][T13510]  dump_stack+0x197/0x210
[  904.848641][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  904.848684][T13510]  print_address_description.constprop.0.cold+0xd4/0x30b
[  904.848701][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  904.848719][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  904.848737][T13510]  __kasan_report.cold+0x1b/0x41
[  904.848756][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  904.848781][T13510]  kasan_report+0x12/0x20
[  904.861869][T13510]  __asan_report_load1_noabort+0x14/0x20
[  904.861889][T13510]  __xfrm_decode_session+0x1cfb/0x2e90
[  904.861906][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  904.861921][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  904.862019][T13510]  vti_tunnel_xmit+0x277/0x17e0
[  904.876554][T13504] FAT-fs (loop0): bogus number of reserved sectors
[  904.879269][T13510]  ? vti_rcv_tunnel+0x1a0/0x1a0
[  904.879300][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  904.879316][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  904.879361][T13510]  dev_hard_start_xmit+0x1a3/0x9b0
[  904.879389][T13510]  sch_direct_xmit+0x372/0xd30
[  904.879409][T13510]  ? dev_watchdog+0xca0/0xca0
[  904.879433][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  904.886499][T13504] FAT-fs (loop0): Can't find a valid FAT filesystem
[  904.889557][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  904.889586][T13510]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  904.889604][T13510]  ? sfb_dequeue+0x421/0x4d0
[  904.889625][T13510]  __qdisc_run+0x4bf/0x1770
[  904.889656][T13510]  __dev_queue_xmit+0x1650/0x35c0
[  904.889684][T13510]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  904.889713][T13510]  ? mark_held_locks+0xf0/0xf0
[  905.004044][T13510]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  905.010297][T13510]  ? debug_smp_processor_id+0x33/0x18a
[  905.015937][T13510]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  905.022097][T13510]  ? rcu_read_lock_held_common+0xbd/0x130
[  905.027824][T13510]  dev_queue_xmit+0x18/0x20
[  905.032331][T13510]  ? dev_queue_xmit+0x18/0x20
[  905.037006][T13510]  neigh_direct_output+0x16/0x20
[  905.041943][T13510]  ip6_finish_output2+0x109a/0x25c0
[  905.047148][T13510]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  905.052693][T13510]  ? lock_downgrade+0x920/0x920
[  905.057605][T13510]  ? netif_rx_ni+0x670/0x670
[  905.062266][T13510]  ? __kasan_check_read+0x11/0x20
[  905.067327][T13510]  __ip6_finish_output+0x444/0xaa0
[  905.072451][T13510]  ? __ip6_finish_output+0x444/0xaa0
[  905.077751][T13510]  ip6_finish_output+0x38/0x1f0
[  905.082600][T13510]  ip6_output+0x25e/0x880
[  905.086952][T13510]  ? ip6_finish_output+0x1f0/0x1f0
[  905.092083][T13510]  ? __ip6_finish_output+0xaa0/0xaa0
[  905.097465][T13510]  ? ip6_make_skb+0x370/0x570
[  905.102173][T13510]  ? ip_reply_glue_bits+0xc0/0xc0
[  905.107509][T13510]  ip6_local_out+0xbb/0x1b0
[  905.112181][T13510]  ip6_send_skb+0xbb/0x350
[  905.116806][T13510]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  905.122277][T13510]  ? ip6_forward_finish+0x570/0x570
[  905.127501][T13510]  udpv6_sendmsg+0x22f3/0x2b30
[  905.132413][T13510]  ? ip_reply_glue_bits+0xc0/0xc0
[  905.137636][T13510]  ? udp_v6_get_port+0x6b0/0x6b0
[  905.142572][T13510]  ? __lock_acquire+0x16f2/0x4a00
[  905.147617][T13510]  ? __kasan_check_read+0x11/0x20
[  905.152645][T13510]  ? mark_lock+0xc2/0x1220
[  905.157066][T13510]  ? finish_task_switch+0x147/0x750
[  905.162269][T13510]  ? ___might_sleep+0x163/0x2c0
[  905.167651][T13510]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  905.173555][T13510]  ? aa_sk_perm+0x346/0xb00
[  905.178548][T13510]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  905.184172][T13510]  inet6_sendmsg+0x9e/0xe0
[  905.188674][T13510]  ? inet6_sendmsg+0x9e/0xe0
[  905.193467][T13510]  ? inet6_ioctl+0x1c0/0x1c0
[  905.198082][T13510]  sock_sendmsg+0xd7/0x130
[  905.202523][T13510]  ____sys_sendmsg+0x358/0x880
[  905.207280][T13510]  ? kernel_sendmsg+0x50/0x50
[  905.212073][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  905.217651][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  905.223758][T13510]  ? find_held_lock+0x35/0x130
[  905.228632][T13510]  ___sys_sendmsg+0x100/0x170
[  905.233815][T13510]  ? sendmsg_copy_msghdr+0x70/0x70
[  905.239019][T13510]  ? __kasan_check_read+0x11/0x20
[  905.244056][T13510]  ? __might_fault+0x12b/0x1e0
[  905.248861][T13510]  ? find_held_lock+0x35/0x130
[  905.254293][T13510]  ? __might_fault+0x12b/0x1e0
[  905.259093][T13510]  ? do_dup2+0x4f0/0x4f0
[  905.263351][T13510]  ? lock_downgrade+0x920/0x920
[  905.268234][T13510]  ? ___might_sleep+0x163/0x2c0
[  905.273103][T13510]  __sys_sendmmsg+0x1bf/0x4d0
[  905.277803][T13510]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  905.283049][T13510]  ? _copy_to_user+0x118/0x160
[  905.287821][T13510]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  905.294069][T13510]  ? put_timespec64+0xda/0x140
[  905.298862][T13510]  ? ns_to_kernel_old_timeval+0x100/0x100
[  905.304707][T13510]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  905.310301][T13510]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  905.315894][T13510]  ? do_syscall_64+0x26/0x790
[  905.320578][T13510]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  905.326762][T13510]  ? do_syscall_64+0x26/0x790
[  905.331551][T13510]  __x64_sys_sendmmsg+0x9d/0x100
[  905.336506][T13510]  do_syscall_64+0xfa/0x790
[  905.341023][T13510]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  905.347213][T13510] RIP: 0033:0x45a919
[  905.351462][T13510] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  905.371965][T13510] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  905.380391][T13510] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a919
[  905.388500][T13510] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  905.396658][T13510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  905.404835][T13510] R10: 00000000000003e8 R11: 0000000000000246 R12: 00007f160d5e46d4
[  905.413008][T13510] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 00000000ffffffff
[  905.420994][T13510] 
[  905.423458][T13510] Allocated by task 9331:
[  905.427974][T13510]  save_stack+0x23/0x90
[  905.432245][T13510]  __kasan_kmalloc.constprop.0+0xcf/0xe0
[  905.438045][T13510]  kasan_kmalloc+0x9/0x10
[  905.442511][T13510]  __kmalloc_node_track_caller+0x4e/0x70
[  905.449483][T13510]  __kmalloc_reserve.isra.0+0x40/0xf0
[  905.454876][T13510]  __alloc_skb+0x10b/0x5e0
[  905.459481][T13510]  nsim_dev_trap_report_work+0x25c/0xaf0
[  905.465133][T13510]  process_one_work+0x9af/0x1740
[  905.470807][T13510]  worker_thread+0x98/0xe40
[  905.475510][T13510]  kthread+0x361/0x430
[  905.479705][T13510]  ret_from_fork+0x24/0x30
[  905.484128][T13510] 
[  905.486447][T13510] Freed by task 9331:
[  905.490896][T13510]  save_stack+0x23/0x90
[  905.495562][T13510]  __kasan_slab_free+0x102/0x150
[  905.500515][T13510]  kasan_slab_free+0xe/0x10
[  905.505046][T13510]  kfree+0x10a/0x2c0
[  905.508964][T13510]  skb_free_head+0x93/0xb0
[  905.513387][T13510]  skb_release_data+0x613/0x8c0
[  905.518625][T13510]  skb_release_all+0x4d/0x60
[  905.523223][T13510]  consume_skb+0xfb/0x410
[  905.527656][T13510]  nsim_dev_trap_report_work+0x7cb/0xaf0
[  905.533383][T13510]  process_one_work+0x9af/0x1740
[  905.538334][T13510]  worker_thread+0x98/0xe40
[  905.542938][T13510]  kthread+0x361/0x430
[  905.547229][T13510]  ret_from_fork+0x24/0x30
[  905.551637][T13510] 
[  905.553979][T13510] The buggy address belongs to the object at ffff88809166e000
[  905.553979][T13510]  which belongs to the cache kmalloc-4k of size 4096
[  905.568603][T13510] The buggy address is located 1886 bytes inside of
[  905.568603][T13510]  4096-byte region [ffff88809166e000, ffff88809166f000)
[  905.582451][T13510] The buggy address belongs to the page:
20:05:07 executing program 2:
r0 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x1}], 0x1}, 0x0)

[  905.588152][T13510] page:ffffea0002459b80 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0
[  905.599112][T13510] raw: 00fffe0000010200 ffffea0002322108 ffffea000138ac88 ffff8880aa402000
[  905.607815][T13510] raw: 0000000000000000 ffff88809166e000 0000000100000001 0000000000000000
[  905.616671][T13510] page dumped because: kasan: bad access detected
[  905.623097][T13510] 
[  905.625528][T13510] Memory state around the buggy address:
[  905.631189][T13510]  ffff88809166e600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  905.639420][T13510]  ffff88809166e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  905.647488][T13510] >ffff88809166e700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  905.655711][T13510]                                                     ^
[  905.662737][T13510]  ffff88809166e780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  905.671645][T13510]  ffff88809166e800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  905.679748][T13510] ==================================================================
[  905.687837][T13510] Disabling lock debugging due to kernel taint
20:05:07 executing program 4:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x60)

[  905.694920][T13510] Kernel panic - not syncing: panic_on_warn set ...
[  905.701635][T13510] CPU: 1 PID: 13510 Comm: syz-executor.3 Tainted: G    B             5.5.0-rc2-next-20191220-syzkaller #0
[  905.713633][T13510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  905.723685][T13510] Call Trace:
[  905.726979][T13510]  dump_stack+0x197/0x210
[  905.732328][T13510]  panic+0x2e3/0x75c
[  905.736224][T13510]  ? add_taint.cold+0x16/0x16
[  905.740890][T13510]  ? retint_kernel+0x2b/0x2b
[  905.745609][T13510]  ? trace_hardirqs_on+0x5e/0x240
[  905.750632][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  905.756394][T13510]  end_report+0x47/0x4f
[  905.760554][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  905.766191][T13510]  __kasan_report.cold+0xe/0x41
[  905.771037][T13510]  ? __xfrm_decode_session+0x1cfb/0x2e90
[  905.776657][T13510]  kasan_report+0x12/0x20
[  905.781010][T13510]  __asan_report_load1_noabort+0x14/0x20
[  905.786640][T13510]  __xfrm_decode_session+0x1cfb/0x2e90
[  905.792088][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  905.797645][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  905.803629][T13510]  vti_tunnel_xmit+0x277/0x17e0
[  905.808484][T13510]  ? vti_rcv_tunnel+0x1a0/0x1a0
[  905.813336][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  905.818879][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  905.824869][T13510]  dev_hard_start_xmit+0x1a3/0x9b0
[  905.829980][T13510]  sch_direct_xmit+0x372/0xd30
[  905.834815][T13510]  ? dev_watchdog+0xca0/0xca0
[  905.839478][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  905.845024][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  905.851170][T13510]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  905.857392][T13510]  ? sfb_dequeue+0x421/0x4d0
[  905.861980][T13510]  __qdisc_run+0x4bf/0x1770
[  905.866487][T13510]  __dev_queue_xmit+0x1650/0x35c0
[  905.871509][T13510]  ? netdev_core_pick_tx+0x2f0/0x2f0
[  905.876779][T13510]  ? mark_held_locks+0xf0/0xf0
[  905.881532][T13510]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  905.887767][T13510]  ? debug_smp_processor_id+0x33/0x18a
[  905.893221][T13510]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  905.900662][T13510]  ? rcu_read_lock_held_common+0xbd/0x130
[  905.906455][T13510]  dev_queue_xmit+0x18/0x20
[  905.910951][T13510]  ? dev_queue_xmit+0x18/0x20
[  905.915617][T13510]  neigh_direct_output+0x16/0x20
[  905.920540][T13510]  ip6_finish_output2+0x109a/0x25c0
[  905.925738][T13510]  ? ip6_sk_dst_lookup_flow+0xb00/0xb00
[  905.931354][T13510]  ? lock_downgrade+0x920/0x920
[  905.936191][T13510]  ? netif_rx_ni+0x670/0x670
[  905.940774][T13510]  ? __kasan_check_read+0x11/0x20
[  905.945783][T13510]  __ip6_finish_output+0x444/0xaa0
[  905.950885][T13510]  ? __ip6_finish_output+0x444/0xaa0
[  905.956164][T13510]  ip6_finish_output+0x38/0x1f0
[  905.961001][T13510]  ip6_output+0x25e/0x880
[  905.965489][T13510]  ? ip6_finish_output+0x1f0/0x1f0
[  905.970613][T13510]  ? __ip6_finish_output+0xaa0/0xaa0
[  905.975986][T13510]  ? ip6_make_skb+0x370/0x570
[  905.980648][T13510]  ? ip_reply_glue_bits+0xc0/0xc0
[  905.985666][T13510]  ip6_local_out+0xbb/0x1b0
[  905.990150][T13510]  ip6_send_skb+0xbb/0x350
[  905.994551][T13510]  udp_v6_send_skb.isra.0+0x7b0/0x15b0
[  905.999989][T13510]  ? ip6_forward_finish+0x570/0x570
[  906.005196][T13510]  udpv6_sendmsg+0x22f3/0x2b30
[  906.009954][T13510]  ? ip_reply_glue_bits+0xc0/0xc0
[  906.014963][T13510]  ? udp_v6_get_port+0x6b0/0x6b0
[  906.019899][T13510]  ? __lock_acquire+0x16f2/0x4a00
[  906.024929][T13510]  ? __kasan_check_read+0x11/0x20
[  906.029968][T13510]  ? mark_lock+0xc2/0x1220
[  906.034388][T13510]  ? finish_task_switch+0x147/0x750
[  906.039579][T13510]  ? ___might_sleep+0x163/0x2c0
[  906.044420][T13510]  ? debug_lockdep_rcu_enabled+0x71/0xa0
[  906.051111][T13510]  ? aa_sk_perm+0x346/0xb00
[  906.055624][T13510]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  906.061160][T13510]  inet6_sendmsg+0x9e/0xe0
[  906.065561][T13510]  ? inet6_sendmsg+0x9e/0xe0
[  906.070136][T13510]  ? inet6_ioctl+0x1c0/0x1c0
[  906.074705][T13510]  sock_sendmsg+0xd7/0x130
[  906.079104][T13510]  ____sys_sendmsg+0x358/0x880
[  906.083853][T13510]  ? kernel_sendmsg+0x50/0x50
[  906.088528][T13510]  ? rcu_read_lock_sched_held+0x9c/0xd0
[  906.094061][T13510]  ? rcu_read_lock_any_held.part.0+0x50/0x50
[  906.100141][T13510]  ? find_held_lock+0x35/0x130
[  906.104922][T13510]  ___sys_sendmsg+0x100/0x170
[  906.109720][T13510]  ? sendmsg_copy_msghdr+0x70/0x70
[  906.114853][T13510]  ? __kasan_check_read+0x11/0x20
[  906.119954][T13510]  ? __might_fault+0x12b/0x1e0
[  906.125578][T13510]  ? find_held_lock+0x35/0x130
[  906.130332][T13510]  ? __might_fault+0x12b/0x1e0
[  906.135093][T13510]  ? do_dup2+0x4f0/0x4f0
[  906.139328][T13510]  ? lock_downgrade+0x920/0x920
[  906.144166][T13510]  ? ___might_sleep+0x163/0x2c0
[  906.148999][T13510]  __sys_sendmmsg+0x1bf/0x4d0
[  906.153669][T13510]  ? __ia32_sys_sendmsg+0xb0/0xb0
[  906.158681][T13510]  ? _copy_to_user+0x118/0x160
[  906.163431][T13510]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  906.169672][T13510]  ? put_timespec64+0xda/0x140
[  906.174419][T13510]  ? ns_to_kernel_old_timeval+0x100/0x100
[  906.180127][T13510]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  906.185569][T13510]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  906.191033][T13510]  ? do_syscall_64+0x26/0x790
[  906.195717][T13510]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  906.201799][T13510]  ? do_syscall_64+0x26/0x790
[  906.206474][T13510]  __x64_sys_sendmmsg+0x9d/0x100
[  906.211396][T13510]  do_syscall_64+0xfa/0x790
[  906.215883][T13510]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  906.221763][T13510] RIP: 0033:0x45a919
[  906.225651][T13510] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  906.245507][T13510] RSP: 002b:00007f160d5e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  906.253900][T13510] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a919
[  906.261856][T13510] RDX: 0000000000000066 RSI: 000000002000ac80 RDI: 0000000000000003
[  906.269810][T13510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  906.278645][T13510] R10: 00000000000003e8 R11: 0000000000000246 R12: 00007f160d5e46d4
[  906.286608][T13510] R13: 00000000004c9267 R14: 00000000004e0fa0 R15: 00000000ffffffff
[  906.295908][T13510] Kernel Offset: disabled
[  906.300371][T13510] Rebooting in 86400 seconds..